420 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author임을규-
dc.date.accessioned2017-08-03T05:01:19Z-
dc.date.available2017-08-03T05:01:19Z-
dc.date.issued2015-10-
dc.identifier.citationProceeding of the 2015 Research in Adaptive and Convergent Systems, RACS 2015 9 October 2015, Page. 308-313en_US
dc.identifier.isbn978-1-4503-3738-0-
dc.identifier.urihttp://dl.acm.org/citation.cfm?doid=2811411.2811543-
dc.identifier.urihttp://hdl.handle.net/20.500.11754/28246-
dc.description.abstractNowadays malware developers use various techniques to avoid detection of antivirus software. For variants of malware, existing signature based detection method could be avoidable because those have some differences in static information like code or strings. Therefore, to detect and classify malware variants, a behavior based detection is required. This paper proposes a technique to extract a representative API pattern from API call sequences of a malware family using multiple sequence alignment (MSA) algorithm to measure similarities among malware variants. To extract API call sequences of malware, a sandbox tool was used. After that, the Clustal algorithm, a popular MSA algorithm used in the Bioinformatics field, was applied to malware API call sequences, and the representative API pattern was extracted from the results of MSA. Experiments to test the extracted API patterns that are used to classify malware variants were carried out, and we measured classification accuracy of the representative API pattern of each family. The experimental results show that our proposed method can be effective to classify malware families. © 2015 ACM.en_US
dc.description.sponsorshipThis research was supported by the MSIP(Ministry of Science, ICT and Future Planning), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2015-H8501-15-1013) supervised by the IITP(Institute for Information & communication Technology Promotion)en_US
dc.language.isoenen_US
dc.publisherACMen_US
dc.subjectMultiple Sequence Alignmenten_US
dc.subjectMalware classificationen_US
dc.subjectRepresentative API patternen_US
dc.titleExtracting representative API patterns of malware families using multiple sequence alignmentsen_US
dc.typeArticleen_US
dc.identifier.doi10.1145/2811411.2811543-
dc.relation.page308-313-
dc.contributor.googleauthorCho, In Kyeom-
dc.contributor.googleauthorIm, Eul Gyu-
dc.sector.campusS-
dc.sector.daehakCOLLEGE OF ENGINEERING[S]-
dc.sector.departmentDEPARTMENT OF COMPUTER SCIENCE-
dc.identifier.pidimeg-
Appears in Collections:
COLLEGE OF ENGINEERING[S](공과대학) > COMPUTER SCIENCE AND ENGINEERING(컴퓨터공학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE