Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Malware detection: program run length against detection rate

Full metadata record
DC Field Value Language
dc.contributor.authorOkane, Philip-
dc.contributor.authorSezer, Sakir-
dc.contributor.authorMcLaughlin, Kieran-
dc.contributor.authorIm, Eul Gyu-
dc.date.accessioned2022-07-16T06:08:48Z-
dc.date.available2022-07-16T06:08:48Z-
dc.date.created2021-05-12-
dc.date.issued2014-02-
dc.identifier.issn1751-8806-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/160718-
dc.description.abstractN-gram analysis is an approach that investigates the structure of a program using bytes, characters or text strings. This research uses dynamic analysis to investigate malware detection using a classification approach based on N-gram analysis. A key issue with dynamic analysis is the length of time a program has to be run to ensure a correct classification. The motivation for this research is to find the optimum subset of operational codes (opcodes) that make the best indicators of malware and to determine how long a program has to be monitored to ensure an accurate support vector machine (SVM) classification of benign and malicious software. The experiments within this study represent programs as opcode density histograms gained through dynamic analysis for different program run periods. A SVM is used as the program classifier to determine the ability of different program run lengths to correctly determine the presence of malicious software. The findings show that malware can be detected with different program run lengths using a small number of opcodes.-
dc.language영어-
dc.language.isoen-
dc.publisherINST ENGINEERING TECHNOLOGY-IET-
dc.titleMalware detection: program run length against detection rate-
dc.typeArticle-
dc.contributor.affiliatedAuthorIm, Eul Gyu-
dc.identifier.doi10.1049/iet-sen.2013.0020-
dc.identifier.scopusid2-s2.0-84893045133-
dc.identifier.wosid000331070000005-
dc.identifier.bibliographicCitationIET SOFTWARE, v.8, no.1, pp.42 - 51-
dc.relation.isPartOfIET SOFTWARE-
dc.citation.titleIET SOFTWARE-
dc.citation.volume8-
dc.citation.number1-
dc.citation.startPage42-
dc.citation.endPage51-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusSupport vector machines-
dc.subject.keywordAuthorinvasive software-
dc.subject.keywordAuthorpattern classification-
dc.subject.keywordAuthorrunlength codes-
dc.subject.keywordAuthorsupport vector machines-
dc.subject.keywordAuthorsystem monitoring-
dc.subject.keywordAuthorprogram classifier-
dc.subject.keywordAuthoropcode density histograms-
dc.subject.keywordAuthormalicious software-
dc.subject.keywordAuthorbenign software-
dc.subject.keywordAuthorSVM classification-
dc.subject.keywordAuthorsupport vector machine-
dc.subject.keywordAuthorprogram monitoring time-
dc.subject.keywordAuthoroperational codes-
dc.subject.keywordAuthordynamic analysis-
dc.subject.keywordAuthorN-gram analysis-
dc.subject.keywordAuthordetection rate-
dc.subject.keywordAuthorprogram run length-
dc.subject.keywordAuthormalware detection-
dc.identifier.urlhttps://ietresearch.onlinelibrary.wiley.com/doi/10.1049/iet-sen.2013.0020-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Im, Eul Gyu photo

Im, Eul Gyu
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE