Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Malware analysis using visualized images and entropy graphs

Full metadata record
DC Field Value Language
dc.contributor.authorHan, Kyoung Soo-
dc.contributor.authorLim, Jae Hyun-
dc.contributor.authorKang, Boojoong-
dc.contributor.authorIm, Eul Gyu-
dc.date.accessioned2022-07-16T00:31:01Z-
dc.date.available2022-07-16T00:31:01Z-
dc.date.created2021-05-12-
dc.date.issued2015-02-
dc.identifier.issn1615-5262-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/157956-
dc.description.abstractToday, along with the development of the Internet, the number of malicious software, or malware, distributed especially for monetary profits, is exponentially increasing, and malware authors are developing malware variants using various automated tools and methods. Automated tools and methods may reuse some modules to develop malware variants, so these reused modules can be used to classify malware or to identify malware families. Therefore, similarities may exist among malware variants can be analyzed and used for malware variant detections and the family classification. This paper proposes a new malware family classification method by converting binary files into images and entropy graphs. The experimental results show that the proposed method can effectively distinguish malware families.-
dc.language영어-
dc.language.isoen-
dc.publisherSPRINGER-
dc.titleMalware analysis using visualized images and entropy graphs-
dc.typeArticle-
dc.contributor.affiliatedAuthorIm, Eul Gyu-
dc.identifier.doi10.1007/s10207-014-0242-0-
dc.identifier.scopusid2-s2.0-84910010286-
dc.identifier.wosid000347729500001-
dc.identifier.bibliographicCitationINTERNATIONAL JOURNAL OF INFORMATION SECURITY, v.14, no.1, pp.1 - 14-
dc.relation.isPartOfINTERNATIONAL JOURNAL OF INFORMATION SECURITY-
dc.citation.titleINTERNATIONAL JOURNAL OF INFORMATION SECURITY-
dc.citation.volume14-
dc.citation.number1-
dc.citation.startPage1-
dc.citation.endPage14-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusSCENE-
dc.subject.keywordAuthorComputer security-
dc.subject.keywordAuthorMalware analysis-
dc.subject.keywordAuthorMalware visualization-
dc.identifier.urlhttps://link.springer.com/article/10.1007/s10207-014-0242-0-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Im, Eul Gyu photo

Im, Eul Gyu
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE