Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

On exploiting static and dynamic features in malware classification

Full metadata record
DC Field Value Language
dc.contributor.authorHong, Jiwon-
dc.contributor.authorPark, Sanghyun-
dc.contributor.authorKim, Sang-Wook-
dc.date.accessioned2022-07-14T01:56:44Z-
dc.date.available2022-07-14T01:56:44Z-
dc.date.created2021-05-13-
dc.date.issued2017-06-
dc.identifier.issn1867-8211-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/152219-
dc.description.abstractThe number of malwares is exponentially growing these days. Malwares have similar signatures if they are developed by the same group of attackers or with similar purposes. This characteristic helps identify malwares from ordinary programs. In this paper, we address a new type of classification that identifies the group of attackers who are likely to develop a given malware. We identify various features obtained through static and dynamic analyses on malwares and exploit them in classification. We evaluate our approach through a series of experiments with a real-world dataset labeled by a group of domain experts. The results show our approach is effective and provides reasonable accuracy in malware classification.-
dc.language영어-
dc.language.isoen-
dc.publisherSpringer Verlag-
dc.titleOn exploiting static and dynamic features in malware classification-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Sang-Wook-
dc.identifier.doi10.1007/978-3-319-58967-1_14-
dc.identifier.scopusid2-s2.0-85020927888-
dc.identifier.bibliographicCitationLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, v.194 LNICST, pp.122 - 129-
dc.relation.isPartOfLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST-
dc.citation.titleLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST-
dc.citation.volume194 LNICST-
dc.citation.startPage122-
dc.citation.endPage129-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusBig data-
dc.subject.keywordPlusClassification (of information)-
dc.subject.keywordPlusComputer crime-
dc.subject.keywordPlusDynamic analysis-
dc.subject.keywordPlusFeature extraction-
dc.subject.keywordPlusStatic analysis-
dc.subject.keywordPlusDomain experts-
dc.subject.keywordPlusDynamic features-
dc.subject.keywordPlusMalware classifications-
dc.subject.keywordPlusMalwares-
dc.subject.keywordPlusReal-world-
dc.subject.keywordPlusReasonable accuracy-
dc.subject.keywordPlusStatic and dynamic analysis-
dc.subject.keywordPlusMalware-
dc.subject.keywordAuthorDynamic analysis-
dc.subject.keywordAuthorFeature extraction-
dc.subject.keywordAuthorMalware classification-
dc.subject.keywordAuthorStatic analysis-
dc.identifier.urlhttps://link.springer.com/chapter/10.1007/978-3-319-58967-1_14-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Sang-Wook photo

Kim, Sang-Wook
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE