Reddy et al., 2006 - Google Patents

N-gram analysis for computer virus detection

Reddy et al., 2006

View PDF
Document ID
16780162295293308695
Author
Reddy D
Pujari A
Publication year
Publication venue
Journal in computer virology

External Links

Snippet

Generic computer virus detection is the need of the hour as most commercial antivirus software fail to detect unknown and new viruses. Motivated by the success of datamining/machine learning techniques in intrusion detection systems, recent research in …
Continue reading at wiki.eecs.yorku.ca (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass

Similar Documents

Publication Publication Date Title
Reddy et al. N-gram analysis for computer virus detection
Kolter et al. Learning to detect and classify malicious executables in the wild.
Siddiqui et al. A survey of data mining techniques for malware detection using file features
Dua et al. Data mining and machine learning in cybersecurity
Schultz et al. Data mining methods for detection of new malicious executables
Kolter et al. Learning to detect malicious executables in the wild
US7487544B2 (en) System and methods for detection of new malicious executables
Fan et al. Malicious sequential pattern mining for automatic malware detection
Ding et al. Control flow-based opcode behavior analysis for malware detection
Rieck et al. Learning and classification of malware behavior
Tabish et al. Malware detection using statistical analysis of byte-level file content
Shabtai et al. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
US7519998B2 (en) Detection of malicious computer executables
Masud et al. Cloud-based malware detection for evolving data streams
Zhang et al. Malicious codes detection based on ensemble learning
Jain et al. Byte level n–gram analysis for malware detection
Sun et al. Pattern recognition techniques for the classification of malware packers
El Boujnouni et al. New malware detection framework based on N-grams and support vector domain description
Dewanje et al. A new malware detection model using emerging machine learning algorithms
Hamlen et al. Exploiting an antivirus interface
Reddy et al. New malicious code detection using variable length n-grams
He et al. Detection of Malicious PDF Files Using a Two‐Stage Machine Learning Algorithm
Masabo et al. Improvement of malware classification using hybrid feature engineering
Liu et al. FENOC: an ensemble one-class learning framework for malware detection
Tarun et al. Exploration of CNN with Node Centred Intrusion Detection Structure Plan for Green Cloud