The Similarity Analysis of Malicious Software

被引:6
|
作者
Liu, Jing [1 ]
Wang, Yuan [1 ]
Wang, Yongjun [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Malicious software; similarity analysis; variants;
D O I
10.1109/DSC.2016.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious software poses a major threat to network security. The sheer volume of it is growing at an exponential pace. Researches have shown that the majority of new malicious samples are just variations of encountered malicious software. Therefore, similarity analysis has been put forward as an effective way to counteract the enormous new instances. Through measuring the similarity degree among instances, it can quickly identify malicious variants. In this paper, we provide an overview of algorithms used in similarity analysis of malicious software.
引用
收藏
页码:161 / 168
页数:8
相关论文
共 50 条
  • [31] Simulating Malicious Users in a Software Reputation System
    Borg, Anton
    Boldt, Martin
    Carlsson, Bengt
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 147 - 156
  • [32] Intelligent host discovery from malicious software
    Patsakis C.
    Alexandris N.
    Smart Innovation, Systems and Technologies, 2010, 2 : 119 - 136
  • [33] A novel testbed for detection of malicious software functionality
    Jensen, Jostein
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 292 - +
  • [34] THE IMPACT OF MALICIOUS AGENTS ON THE ENTERPRISE SOFTWARE INDUSTRY
    Galbreth, Michael R.
    Shor, Mikhael
    MIS QUARTERLY, 2010, 34 (03) : 595 - 612
  • [35] A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges
    Maniriho, Pascal
    Mahmood, Abdun Naser
    Chowdhury, Mohammad Jabed Morshed
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 130 : 1 - 18
  • [36] A method for efficient malicious code detection based on conceptual similarity
    Kim, Sungsuk
    Choi, Chang
    Choi, Junho
    Kim, Pankoo
    Kim, Hanil
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 567 - 576
  • [37] Recognizing malicious software behaviors with tree automata inference
    Babic, Domagoj
    Reynaud, Daniel
    Song, Dawn
    FORMAL METHODS IN SYSTEM DESIGN, 2012, 41 (01) : 107 - 128
  • [38] Malicious Software Detection utilizing Temporal-Graphs
    Mpanti, Anna
    Nikolopoulos, Stavros D.
    Polenakis, Iosif
    COMPUTER SYSTEMS AND TECHNOLOGIES, 2019, : 49 - 55
  • [39] Defending medical information systems against malicious software
    Gobuty, DE
    CARS 2004: COMPUTER ASSISTED RADIOLOGY AND SURGERY, PROCEEDINGS, 2004, 1268 : 96 - 107
  • [40] Recognizing malicious software behaviors with tree automata inference
    Domagoj Babić
    Daniel Reynaud
    Dawn Song
    Formal Methods in System Design, 2012, 41 : 107 - 128