The Similarity Analysis of Malicious Software

被引:6
|
作者
Liu, Jing [1 ]
Wang, Yuan [1 ]
Wang, Yongjun [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Malicious software; similarity analysis; variants;
D O I
10.1109/DSC.2016.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious software poses a major threat to network security. The sheer volume of it is growing at an exponential pace. Researches have shown that the majority of new malicious samples are just variations of encountered malicious software. Therefore, similarity analysis has been put forward as an effective way to counteract the enormous new instances. Through measuring the similarity degree among instances, it can quickly identify malicious variants. In this paper, we provide an overview of algorithms used in similarity analysis of malicious software.
引用
收藏
页码:161 / 168
页数:8
相关论文
共 50 条
  • [41] Behavioral biometrics for verification and recognition of malicious software agents
    Yampolskiy, Roman V.
    Govindaraju, Venu
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE VII, 2008, 6943
  • [42] DISCOVERING MALICIOUS SIGNATURES IN SOFTWARE FROM STRUCTURAL INTERACTIONS
    Yin, Chenzhong
    Zhang, Hantang
    Cheng, Mingxi
    Xiao, Xiongye
    Chen, Xinghe
    Ren, Xin
    Bogdan, Paul
    2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, : 4845 - 4849
  • [43] Malicious mobile software agents: A categorisation of defence initiatives
    Greenaway, AP
    Mckee, GT
    10TH INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 1997, : 76 - 79
  • [44] Impact of Cyberattacks by Malicious Hackers on the Competition in Software Markets
    Sen, Ravi
    Verma, Ajay
    Heim, Gregory R.
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2020, 37 (01) : 191 - 216
  • [45] A Differential Coefficient Inspired Method for Malicious Software Detection
    Liang Yiwen
    Yang He
    Li Tao
    Liu Changdong
    2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 3, PROCEEDINGS, 2009, : 130 - 133
  • [46] A Measurement Study on Interprocess Code Propagation of Malicious Software
    Jenke, Thorsten
    Liessem, Simon
    Padilla, Elmar
    Bruckschen, Lilli
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 264 - 282
  • [47] On the Similarity of Software Development Documentation
    Ellmann, Mathias
    ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, : 1030 - 1033
  • [48] Optimization of Protection of Computer Networks against Malicious Software
    Taynitskiy, Vladislav
    Gubar, Elena
    Zhitkova, Ekaterina
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE STABILITY AND OSCILLATIONS OF NONLINEAR CONTROL SYSTEMS (PYATNITSKIY'S CONFERENCE), 2016,
  • [49] The code red worm - Malicious software knows no bounds
    Berghel, H
    COMMUNICATIONS OF THE ACM, 2001, 44 (12) : 15 - 19
  • [50] Implementation for Malicious Software Using ChatGPT-4
    Sugio, Nobuyuki
    Ito, Hokuto
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2024, 2024, 14977 : 234 - 243