Detailed Information

Cited 12 time in webofscience Cited 0 time in scopus
Metadata Downloads

Metamorphic malicious code behavior detection using probabilistic inference methods

Full metadata record
DC Field Value Language
dc.contributor.authorChoi, Chang-
dc.contributor.authorEsposito, Christian-
dc.contributor.authorLee, Mungyu-
dc.contributor.authorChoi, Junho-
dc.date.available2020-10-20T06:43:50Z-
dc.date.created2020-06-10-
dc.date.issued2019-08-
dc.identifier.issn1389-0417-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/78551-
dc.description.abstractExisting antivirus programs detect malicious code based on fixed signatures; therefore, they have limitations in detecting metamorphic malicious code that lacks signature information or possesses circumventing code inserted into it. Research on the methods for detecting this type of metamorphic malicious code primarily focuses on techniques that can detect code based on behavioral similarity to known malicious code. However, these techniques measure the degree of similarity with existing malicious code using API function call patterns. Therefore, they have certain disadvantages, such as low accuracy and large detection times. In this paper, we propose a method which can overcome the limitations of existing methods by using the FP-Growth algorithm, a data mining technique, and the Markov Logic Networks algorithm, a probabilistic inference method. To perform a comparative evaluation of the proposed method's malicious code behavior detection, we performed inference experiments using malicious code with an inserted code for random malicious behavior. We performed experiments to select optimal weights for each inference rule to improve our malicious code behavior inferences' accuracy. The results of experiments, in which we performed a comparative evaluation with the General Bayesian Network, showed that the proposed method had an 8% higher classification performance. (C) 2019 Elsevier B.V. All rights reserved.-
dc.language영어-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE BV-
dc.relation.isPartOfCOGNITIVE SYSTEMS RESEARCH-
dc.titleMetamorphic malicious code behavior detection using probabilistic inference methods-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000468975100019-
dc.identifier.doi10.1016/j.cogsys.2019.03.007-
dc.identifier.bibliographicCitationCOGNITIVE SYSTEMS RESEARCH, v.56, pp.142 - 150-
dc.description.isOpenAccessN-
dc.citation.endPage150-
dc.citation.startPage142-
dc.citation.titleCOGNITIVE SYSTEMS RESEARCH-
dc.citation.volume56-
dc.contributor.affiliatedAuthorChoi, Chang-
dc.type.docTypeArticle-
dc.subject.keywordAuthorMalicious code-
dc.subject.keywordAuthorProbabilistic inference-
dc.subject.keywordAuthorMarkov logic networks-
dc.subject.keywordAuthorMalicious behavior patterns-
dc.subject.keywordPlusMALWARE DETECTION-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaNeurosciences & Neurology-
dc.relation.journalResearchAreaPsychology-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.relation.journalWebOfScienceCategoryNeurosciences-
dc.relation.journalWebOfScienceCategoryPsychology, Experimental-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassssci-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Choi, Chang photo

Choi, Chang
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE