The Similarity Analysis of Malicious Software

被引:6
|
作者
Liu, Jing [1 ]
Wang, Yuan [1 ]
Wang, Yongjun [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Malicious software; similarity analysis; variants;
D O I
10.1109/DSC.2016.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious software poses a major threat to network security. The sheer volume of it is growing at an exponential pace. Researches have shown that the majority of new malicious samples are just variations of encountered malicious software. Therefore, similarity analysis has been put forward as an effective way to counteract the enormous new instances. Through measuring the similarity degree among instances, it can quickly identify malicious variants. In this paper, we provide an overview of algorithms used in similarity analysis of malicious software.
引用
收藏
页码:161 / 168
页数:8
相关论文
共 50 条
  • [21] Software piracy attacks on java software using malicious aspects
    Department of Computer Science, National Chengchi University, Taiwan
    J. Internet Technol., 2007, 1 (97-108):
  • [22] Software Malicious Behavior Analysis Model based on System Call and Function Interface
    Fan, Yongkai
    Lei, Jing
    Peng, Cong
    Wang, Jinghan
    Liu, Jiaxu
    Zhao, Guanqun
    Bai, Jianrong
    2019 9TH IEEE ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (IEEE-CYBER 2019), 2019, : 59 - 64
  • [23] Dynamic analysis of malicious behavior propagation based on feature selection in software network
    Xue, Huajian
    Wang, Yali
    Tang, Qiguang
    FRONTIERS IN PHYSICS, 2024, 12
  • [24] Threat Analysis and Malicious User Detection in Reputation Systems using Mean Bisector Analysis and Cosine Similarity (MBACS)
    Jnanamurthy, H. K.
    Warty, Chirag
    Singh, Sanjay
    2013 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2013,
  • [25] Malicious Code Detection Based on Software Fingerprint
    Yin, Zhimin
    Yu, Xiangzhan
    Niu, Linhua
    PROCEEDINGS OF THE 2013 THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFTWARE ENGINEERING (ICAISE 2013), 2013, 37 : 212 - 216
  • [26] Monitoring and Diagnosing Malicious Attacks with Autonomic Software
    Souza, Vitor E. Silva
    Mylopoulos, John
    CONCEPTUAL MODELING - ER 2009, PROCEEDINGS, 2009, 5829 : 84 - 98
  • [27] Handling Malicious Switches in Software Defined Networks
    Ghannam, Rami
    Chung, Anthony
    NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, : 1245 - 1248
  • [28] Kill the bots! Software thwarts malicious hackers
    不详
    TECHNOLOGY REVIEW, 2005, 108 (05) : 82 - 82
  • [29] Exploring the Long Tail of (Malicious) Software Downloads
    Rahbarinia, Babak
    Balduzzi, Marco
    Perdisci, Roberto
    2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, : 391 - 402
  • [30] Malicious and Harmless Software in the Domain of System Utilities
    St'astna, Jana
    PROCEEDINGS OF THE 2019 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2019, : 237 - 246