Malware analysis using visualized images and entropy graphs
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Han, Kyoung Soo | - |
dc.contributor.author | Lim, Jae Hyun | - |
dc.contributor.author | Kang, Boojoong | - |
dc.contributor.author | Im, Eul Gyu | - |
dc.date.accessioned | 2022-07-16T00:31:01Z | - |
dc.date.available | 2022-07-16T00:31:01Z | - |
dc.date.created | 2021-05-12 | - |
dc.date.issued | 2015-02 | - |
dc.identifier.issn | 1615-5262 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/157956 | - |
dc.description.abstract | Today, along with the development of the Internet, the number of malicious software, or malware, distributed especially for monetary profits, is exponentially increasing, and malware authors are developing malware variants using various automated tools and methods. Automated tools and methods may reuse some modules to develop malware variants, so these reused modules can be used to classify malware or to identify malware families. Therefore, similarities may exist among malware variants can be analyzed and used for malware variant detections and the family classification. This paper proposes a new malware family classification method by converting binary files into images and entropy graphs. The experimental results show that the proposed method can effectively distinguish malware families. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.title | Malware analysis using visualized images and entropy graphs | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Im, Eul Gyu | - |
dc.identifier.doi | 10.1007/s10207-014-0242-0 | - |
dc.identifier.scopusid | 2-s2.0-84910010286 | - |
dc.identifier.wosid | 000347729500001 | - |
dc.identifier.bibliographicCitation | INTERNATIONAL JOURNAL OF INFORMATION SECURITY, v.14, no.1, pp.1 - 14 | - |
dc.relation.isPartOf | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | - |
dc.citation.title | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | - |
dc.citation.volume | 14 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 14 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | SCENE | - |
dc.subject.keywordAuthor | Computer security | - |
dc.subject.keywordAuthor | Malware analysis | - |
dc.subject.keywordAuthor | Malware visualization | - |
dc.identifier.url | https://link.springer.com/article/10.1007/s10207-014-0242-0 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.