Integrated Usage of Data Mining Methods for Malware Detection

被引:0
作者
Komashinskiy, Dmitriy [1 ]
Kotenko, Igor [1 ]
机构
[1] St Petersburg Inst Informat & Automat SPIIRAS, St Petersburg, Russia
来源
INFORMATION FUSION AND GEOGRAPHIC INFORMATION SYSTEMS, PROCEEDINGS | 2009年
关键词
Data mining; Malware; Behavior-based malware detection;
D O I
10.1007/978-3-642-00304-2_24
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The problem of counteracting malicious software (malware) remains a real one in all computer systems, including Geographical Information Systems (GIS), despite the obvious successes of antivirus vendors in technologies aimed at early recognition of malware propagation, code analysis, and malware rapid updating of databases The basic issue of that problem is the quality of heuristic detection methods. The goal of these methods is to provide recognition of unknown malware samples, therefore heuristic detection is the last defense line of any critical object in IT infrastructure. The paper is devoted to the application of data mining methods to heuristic detector development The offered approach differs from existing ones by cyclic interactive covert processing of behavioral information, and integrated use of different methods of data mining for various classes of malware. The paper discusses research into how a family of different data mining methods based on Bayes approach, decision trees and neural networks were implemented and investigated. The paper proposes a general integrated approach to realization of malware detection methods.
引用
收藏
页码:343 / 357
页数:15
相关论文
共 9 条
[1]  
[Anonymous], MSDN MAGAZINE
[2]  
Aycock J, 2006, ADV INFORM SECURITY, V22
[3]  
Cios K., 2007, Data Mining A Knowledge Discovery
[4]  
RAFFETSEDER T, 2007, LNCS, V4779
[5]  
SCHREIBER SB, 2002, UNDOCUMENTED WINDOWS
[6]  
SCHULTZ MG, 2005, INFORM COMPUT SCI, V172
[7]  
WANG JH, 2003, IEEE 37 ANN INT CARN
[8]  
ZHANG BY, 2006, INTE J COMPUT INTELL, V2
[9]  
VX HEAVENS SITE