Fractal Methods for the Representation and Analysis of Polymorphism in Malware Fractal Methods for the Representation and Analysis of Polymorphism in Malware

被引:0
作者
Cowen, Benn [1 ]
Shafi, Kamran [2 ]
机构
[1] Dept Def, Canberra, ACT, Australia
[2] Univ New S Wales, Sch Engn & IT, Canberra, ACT, Australia
来源
2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MILCIS) | 2012年
关键词
Computer security; Fractals; Intrusion detection; Random processes; Visualization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The preponderance of network resident cyber threats are due to zero day vulnerabilities or unpatched systems. Traditional signature based detection methods are ineffective against such threats, and anomaly detection methods are typically computationally intensive. By treating polymorphism as a stochastic process and applying fractal visualization methods, identifying features can be found. These features are suited to then be used for detection with algorithms such as Bayes classifiers.
引用
收藏
页数:5
相关论文
共 16 条
[1]   Analysis of genomic sequences by Chaos Game Representation [J].
Almeida, JS ;
Carriço, JA ;
Maretzek, A ;
Noble, PA ;
Fletcher, M .
BIOINFORMATICS, 2001, 17 (05) :429-437
[2]  
[Anonymous], 2012, FRACTALS EVERYWHERE
[3]  
[Anonymous], P 2001 IEEE S SEC PR
[4]  
cH4R, 2004, CH4R REAL POL ENG
[5]  
Choo K-KR, 2011, CYBER THREAT LANDSCA
[6]  
CLET Team, 2003, POL SHELL ENG
[7]   The dynamics of exchange rate time series and the chaos game [J].
Cristescu, C. P. ;
Stan, C. ;
Scarlat, E. I. .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2009, 388 (23) :4845-4855
[8]  
Hutchings A., 2012, Computer security threats faced by small businesses in Australia
[9]   CHAOS GAME REPRESENTATION OF GENE STRUCTURE [J].
JEFFREY, HJ .
NUCLEIC ACIDS RESEARCH, 1990, 18 (08) :2163-2170
[10]  
Mandelbrot B. B., 1976, SCIENCE, V156, P636