Han et al., 2014 - Google Patents
Distributed malware detection based on binary file features in cloud computing environmentHan et al., 2014
- Document ID
- 17936763069470229675
- Author
- Han X
- Sun J
- Qu W
- Yao X
- Publication year
- Publication venue
- The 26th Chinese Control and Decision Conference (2014 CCDC)
External Links
Snippet
A number of techniques have been devised by researchers to counter malware attacks, and machine learning techniques play an important role in automated malware detection. Several machine learning approaches have been applied to malware detection, based on …
- 238000001514 detection method 0 title abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hassen et al. | Scalable function call graph-based malware classification | |
US9003529B2 (en) | Apparatus and method for identifying related code variants in binaries | |
Kirat et al. | Sigmal: A static signal processing based malware triage | |
Shobana et al. | A novel approach to detect IoT malware by system calls using Deep learning techniques | |
WO2016149159A1 (en) | Large scale malicious process detection | |
Wang et al. | Semantic-aware blocking for entity resolution | |
CN105447113B (en) | A kind of information analysis method based on big data | |
CN104751055A (en) | Method, device and system for detecting distributed malicious codes on basis of textures | |
Xiaofang et al. | Malware variant detection using similarity search over content fingerprint | |
Naik et al. | A ransomware detection method using fuzzy hashing for mitigating the risk of occlusion of information systems | |
AU2015324282A1 (en) | Protected indexing and querying of large sets of textual data | |
Kostakis | Classy: fast clustering streams of call-graphs | |
Sahoo et al. | Signature based malware detection for unstructured data in Hadoop | |
McGahagan et al. | A comprehensive evaluation of webpage content features for detecting malicious websites | |
Yamany et al. | Ransomware clustering and classification using similarity matrix | |
CN111666258B (en) | Information processing method and device, information query method and device | |
Han et al. | Distributed malware detection based on binary file features in cloud computing environment | |
Chen et al. | An improved Simhash algorithm based malicious mirror website detection method | |
Yu et al. | A unified malicious documents detection model based on two layers of abstraction | |
Ayeni | A Supervised Machine Learning Algorithm for Detecting Malware | |
Lei et al. | Design and implementation of an automatic scanning tool of SQL injection vulnerability based on Web crawler | |
Hoang et al. | Detecting Malware Based on Statistics and Machine Learning Using Opcode N-Grams | |
Lee et al. | Similar pair identification using locality-sensitive hashing technique | |
Van Dam et al. | Duplicate detection in web shops using LSH to reduce the number of computations | |
Jiang et al. | Detecting malicious pdf documents using semi-supervised machine learning |