The Similarity Analysis of Malicious Software

被引:6
|
作者
Liu, Jing [1 ]
Wang, Yuan [1 ]
Wang, Yongjun [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Malicious software; similarity analysis; variants;
D O I
10.1109/DSC.2016.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious software poses a major threat to network security. The sheer volume of it is growing at an exponential pace. Researches have shown that the majority of new malicious samples are just variations of encountered malicious software. Therefore, similarity analysis has been put forward as an effective way to counteract the enormous new instances. Through measuring the similarity degree among instances, it can quickly identify malicious variants. In this paper, we provide an overview of algorithms used in similarity analysis of malicious software.
引用
收藏
页码:161 / 168
页数:8
相关论文
共 50 条
  • [1] Similarity analysis of malicious executables
    Sulaiman, Anthonius
    Manclada, Sandeep
    Mukkamala, Srinivas
    Sung, Andrew
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 225 - 232
  • [2] Analysis of Mirai Malicious Software
    Sinanovic, Hamdija
    Mrdovic, Sasa
    2017 25TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2017, : 416 - 420
  • [3] On malicious software classification
    Lin Jianhui
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION WORKSHOP: IITA 2008 WORKSHOPS, PROCEEDINGS, 2008, : 368 - 371
  • [4] Lines of Malicious Code: Insights Into the Malicious Software Industry
    Lindorfer, Martina
    Di Federico, Alessandro
    Maggi, Federico
    Comparetti, Paolo Milani
    Zanero, Stefano
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 349 - 358
  • [5] About malicious software in smartphones
    Toyssy, Sampo
    Helenius, Marko
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (02): : 109 - 119
  • [6] Research On Detection Of Malicious Software
    Peng, Boyuan
    2021 2ND INTERNATIONAL CONFERENCE ON E-COMMERCE AND INTERNET TECHNOLOGY (ECIT 2021), 2021, : 400 - 403
  • [7] A classification of malicious software attacks
    Langweg, H
    Snekkenes, E
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 827 - 832
  • [8] The Art of Anti Malicious Software
    Huang, Lingfang
    2015 SSR International Conference on Social Sciences and Information (SSR-SSI 2015), Pt 2, 2015, 11 : 595 - 599
  • [9] Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis
    Buyukkayhan, Ahmet Salih
    Oprea, Alina
    Li, Zhou
    Robertson, William
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017), 2017, 10453 : 73 - 97
  • [10] Malicious Domain Detection Based on Traffic Similarity
    Hu, Jianping
    Wang, Yongyi
    Shi, Fan
    Xu, Chengxi
    2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY, CII 2017, 2017, : 416 - 421