SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection
DC Field | Value | Language |
---|---|---|
dc.contributor.author | O'Kane, Philip | - |
dc.contributor.author | Sezer, Sakir | - |
dc.contributor.author | McLaughlin, Kieran | - |
dc.contributor.author | Im, Eul Gyu | - |
dc.date.accessioned | 2022-07-16T11:01:11Z | - |
dc.date.available | 2022-07-16T11:01:11Z | - |
dc.date.created | 2021-05-12 | - |
dc.date.issued | 2013-03 | - |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/163277 | - |
dc.description.abstract | N-gram analysis is an approach that investigates the structure of a program using bytes, characters, or text strings. A key issue with N-gram analysis is feature selection amidst the explosion of features that occurs when N is increased. The experiments within this paper represent programs as operational code (opcode) density histograms gained through dynamic analysis. A support vector machine is used to create a reference model, which is used to evaluate two methods of feature reduction, which are "area of intersect" and "subspace analysis using eigenvectors." The findings show that the relationships between features are complex and simple statistics filtering approaches do not provide a viable approach. However, eigenvector subspace analysis produces a suitable filter. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Im, Eul Gyu | - |
dc.identifier.doi | 10.1109/TIFS.2013.2242890 | - |
dc.identifier.scopusid | 2-s2.0-84874604512 | - |
dc.identifier.wosid | 000318597400007 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.8, no.3, pp.500 - 509 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
dc.citation.title | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
dc.citation.volume | 8 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 500 | - |
dc.citation.endPage | 509 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | Computer crime | - |
dc.subject.keywordPlus | Eigenvalues and eigenfunctions | - |
dc.subject.keywordPlus | Packers | - |
dc.subject.keywordPlus | Polymorphism | - |
dc.subject.keywordAuthor | KNN | - |
dc.subject.keywordAuthor | metamorphism malware | - |
dc.subject.keywordAuthor | obfuscation | - |
dc.subject.keywordAuthor | packers | - |
dc.subject.keywordAuthor | polymorphism | - |
dc.subject.keywordAuthor | SVM | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/6420939 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.