Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection

Full metadata record
DC Field Value Language
dc.contributor.authorO'Kane, Philip-
dc.contributor.authorSezer, Sakir-
dc.contributor.authorMcLaughlin, Kieran-
dc.contributor.authorIm, Eul Gyu-
dc.date.accessioned2022-07-16T11:01:11Z-
dc.date.available2022-07-16T11:01:11Z-
dc.date.created2021-05-12-
dc.date.issued2013-03-
dc.identifier.issn1556-6013-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/163277-
dc.description.abstractN-gram analysis is an approach that investigates the structure of a program using bytes, characters, or text strings. A key issue with N-gram analysis is feature selection amidst the explosion of features that occurs when N is increased. The experiments within this paper represent programs as operational code (opcode) density histograms gained through dynamic analysis. A support vector machine is used to create a reference model, which is used to evaluate two methods of feature reduction, which are "area of intersect" and "subspace analysis using eigenvectors." The findings show that the relationships between features are complex and simple statistics filtering approaches do not provide a viable approach. However, eigenvector subspace analysis produces a suitable filter.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleSVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection-
dc.typeArticle-
dc.contributor.affiliatedAuthorIm, Eul Gyu-
dc.identifier.doi10.1109/TIFS.2013.2242890-
dc.identifier.scopusid2-s2.0-84874604512-
dc.identifier.wosid000318597400007-
dc.identifier.bibliographicCitationIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.8, no.3, pp.500 - 509-
dc.relation.isPartOfIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.citation.titleIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.citation.volume8-
dc.citation.number3-
dc.citation.startPage500-
dc.citation.endPage509-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusComputer crime-
dc.subject.keywordPlusEigenvalues and eigenfunctions-
dc.subject.keywordPlusPackers-
dc.subject.keywordPlusPolymorphism-
dc.subject.keywordAuthorKNN-
dc.subject.keywordAuthormetamorphism malware-
dc.subject.keywordAuthorobfuscation-
dc.subject.keywordAuthorpackers-
dc.subject.keywordAuthorpolymorphism-
dc.subject.keywordAuthorSVM-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/6420939-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Im, Eul Gyu photo

Im, Eul Gyu
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE