Reddy et al., 2006 - Google Patents
N-gram analysis for computer virus detectionReddy et al., 2006
View PDF- Document ID
- 16780162295293308695
- Author
- Reddy D
- Pujari A
- Publication year
- Publication venue
- Journal in computer virology
External Links
Snippet
Generic computer virus detection is the need of the hour as most commercial antivirus software fail to detect unknown and new viruses. Motivated by the success of datamining/machine learning techniques in intrusion detection systems, recent research in …
- 241000700605 Viruses 0 title abstract description 77
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Reddy et al. | N-gram analysis for computer virus detection | |
Kolter et al. | Learning to detect and classify malicious executables in the wild. | |
Siddiqui et al. | A survey of data mining techniques for malware detection using file features | |
Dua et al. | Data mining and machine learning in cybersecurity | |
Schultz et al. | Data mining methods for detection of new malicious executables | |
Kolter et al. | Learning to detect malicious executables in the wild | |
US7487544B2 (en) | System and methods for detection of new malicious executables | |
Fan et al. | Malicious sequential pattern mining for automatic malware detection | |
Ding et al. | Control flow-based opcode behavior analysis for malware detection | |
Rieck et al. | Learning and classification of malware behavior | |
Tabish et al. | Malware detection using statistical analysis of byte-level file content | |
Shabtai et al. | Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey | |
US7519998B2 (en) | Detection of malicious computer executables | |
Masud et al. | Cloud-based malware detection for evolving data streams | |
Zhang et al. | Malicious codes detection based on ensemble learning | |
Jain et al. | Byte level n–gram analysis for malware detection | |
Sun et al. | Pattern recognition techniques for the classification of malware packers | |
El Boujnouni et al. | New malware detection framework based on N-grams and support vector domain description | |
Dewanje et al. | A new malware detection model using emerging machine learning algorithms | |
Hamlen et al. | Exploiting an antivirus interface | |
Reddy et al. | New malicious code detection using variable length n-grams | |
He et al. | Detection of Malicious PDF Files Using a Two‐Stage Machine Learning Algorithm | |
Masabo et al. | Improvement of malware classification using hybrid feature engineering | |
Liu et al. | FENOC: an ensemble one-class learning framework for malware detection | |
Tarun et al. | Exploration of CNN with Node Centred Intrusion Detection Structure Plan for Green Cloud |