完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Lin, Ying-Dar | en_US |
dc.contributor.author | Lai, Yuan-Cheng | en_US |
dc.contributor.author | Lu, Chun-Nan | en_US |
dc.contributor.author | Hsu, Peng-Kai | en_US |
dc.contributor.author | Lee, Chia-Yin | en_US |
dc.date.accessioned | 2019-04-03T06:38:47Z | - |
dc.date.available | 2019-04-03T06:38:47Z | - |
dc.date.issued | 2015-07-25 | en_US |
dc.identifier.issn | 1939-0114 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1002/sec.1148 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/127857 | - |
dc.description.abstract | To improve both accuracy and efficiency in detecting known and even unknown malware, we propose a three-phase behavior-based malware detection and classification approach, with a faster detector in the first phase to filter most samples, a slower detector in the second phase to observe remaining ambiguous samples, and then a classifier in the third phase to recognize their malware type. The faster detector executes programs in a sandbox to extract representative behaviors fed into a trained artificial neural network to evaluate their maliciousness, whereas the slower detector extracts and matches the LCSs of system call sequences fed into a trained Bayesian model to calculate their maliciousness. In the third phase, we define malware behavior vectors and calculate the cosine similarity to classify the malware. The experimental results show that the hybrid two-phase detection scheme outperforms the one-phase schemes and achieves 3.6% in false negative and 6.8% in false positive. The third-phase classifier also distinguishes the known-type malware with an accuracy of 85.8%. Copyright (c) 2015 John Wiley & Sons, Ltd. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | malware detection | en_US |
dc.subject | malware classification | en_US |
dc.subject | behavior analysis | en_US |
dc.subject | sandbox | en_US |
dc.subject | system call | en_US |
dc.title | Three-phase behavior-based detection and classification of known and unknown malware | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1002/sec.1148 | en_US |
dc.identifier.journal | SECURITY AND COMMUNICATION NETWORKS | en_US |
dc.citation.volume | 8 | en_US |
dc.citation.issue | 11 | en_US |
dc.citation.spage | 2004 | en_US |
dc.citation.epage | 2015 | en_US |
dc.contributor.department | 交大名義發表 | zh_TW |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | National Chiao Tung University | en_US |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000356393500004 | en_US |
dc.citation.woscount | 6 | en_US |
顯示於類別: | 期刊論文 |