참고문헌
- McAfee, Mcafee labs threats report, Nov. 2014.
- K. Rieck, et al., "Learning and classification of malware behavior," DIMVA '08, pp. 108-125, Paris, France, Jul. 2008.
- M. Bailey, et al., "Automated classification and analysis of internet malware," Recent advances in Intrusion Detection, vol. 4637, pp. 178-197, 2007.
- S. Cesare and Y. Xiang, "Malware variant detection using similarity search over sets of control flow graphs," IEEE TrustCom, pp. 181-189, 2011.
- J. Kinable and O. Kostakis, "Malware classification based on call graph clustering," J. Comput. Virol., vol. 7, no. 4, pp. 233-245, 2011. https://doi.org/10.1007/s11416-011-0151-y
- M. K. Shankarapani, et al., "Malware detection using assembly and API call sequences," J. Comput. Virol., vol. 7, no. 2, pp. 107-119, 2011. https://doi.org/10.1007/s11416-010-0141-5
- K. Iwamoto and K. Wasaki, "Malware classification based on extracted api sequences using static analysis," in Proc. AINTEC '12, pp. 31-38, Bangkok, Thailand, Nov. 2012.
- K.-H. Kim and M.-J. Choi, "Linear SVM-Based android malware detection and feature selection for performance improvement," J. KICS, vol. 39, no. 8, pp. 738-745, Aug. 2014.
- H.-H. Kim and M.-J. Choi, "Android malware detection using auto-regressive moving-average model," J. KICS, vol. 40, no. 8, pp. 1551-1559, Aug. 2015. https://doi.org/10.7840/kics.2015.40.8.1551
- U. Bayer, et al., "Scalable, Behavior-Based malware clustering," NDSS Symp., vol. 9, 2009.
- I. K. Cho, et al., "Malware similarity analysis using API sequence alignments," JISIS, vol. 4, no. 4, pp. 103-114, 2014.
- G. Berger-Sabbatel and A. Duda, "Classification of malware network activity," Multimedia Commun., Services and Security, vol. 287, pp. 24-35, 2012.
- N. Stakhanova, M. Couture, and Ali A. Ghorbani, "Exploring network-based malware classification," IEEE MALWARE, Oct. 2011.
- R. Perdisci, W. Lee, and N. Feamster, "Behavioral clustering of HTTP-Based malware and signature generation using malicious network traces," NSDI Proc. 7th USENIX Conf. Netw. Syst. Design and Implementation, p. 26, San Jose, California, Apr. 2010.
- M. Z. Rafique, et al., "Evolutionary algorithms for classification of malware families through different network behaviors," GECCO '14, pp. 1167-1174, Vancouver, Canada, Jul. 2014.
- I. Ahmed and K. Lhee, "Classification of packet contents for malware detection," J. Comput. Virol., vol. 7, no. 4, pp. 279-295, 2011. https://doi.org/10.1007/s11416-011-0156-6
- S. Nari and Ali A. Ghorbani, "Automated malware classification based on network behavior," IEEE ICNC, pp. 642-647, 2013.
- Y. Jung and M. Park, "Network defense mechanism based on isolated networks," J. KICS, vol. 41, no. 9, pp. 1103-1107, Sept. 2016. https://doi.org/10.7840/kics.2016.41.9.1103
- S. Coull, et al., "Intrusion detection: A bioinformatics approach," in Proc. IEEE Annu. Comput. Security Appl. Conf., 2004.
- Scott E. Coull and Boleslaw K. Szymanski, "Sequence alignment for masquerade detection," J. Computational Statistics & Data Anal., vol. 52, no. 8, pp. 4116-4131, Apr. 2008. https://doi.org/10.1016/j.csda.2008.01.022
- M. K. Shankarapani, et al., "Malware detection using assembly and API call sequences," J. Comput. Virol., vol. 7, no. 2, pp. 107-119, 2011. https://doi.org/10.1007/s11416-010-0141-5
- J. Pedersen, et al., "Fingerprinting malware using bioinformatics tools building a classifier for the zeus virus," in Proc. Int. Conf. Security and Management (SAM), Jan. 2013.
- Saul B. Needleman and Christian D. Wunsch, "A general method applicable to the search for similarities in the amino acid sequence of two proteins," J. molecular biology, vol. 48, no.3, pp. 443-453, Mar. 1970. https://doi.org/10.1016/0022-2836(70)90057-4
- T. F. Smith and M. S. Waterman, "Identification of common molecular subsequences," J. Molecular Biology, vol. 147, no. 1, pp. 195-197, Mar. 1981. https://doi.org/10.1016/0022-2836(81)90087-5
- J. Erman, M. Arlitt, and A. Mahanti, "Traffic classification using clustering algorithms," in Proc. MineNet '06 ACM, pp. 281-286, Pisa, Italy, Sept. 2006.
피인용 문헌
- 광범위한 단말 정보 식별을 위한 스캔 모델링 및 성능 분석 vol.42, pp.4, 2017, https://doi.org/10.7840/kics.2017.42.4.785
- Endpoint에 적용 가능한 정적 feature 기반 고속의 사이버 침투공격 분석기술 연구 vol.19, pp.5, 2017, https://doi.org/10.7472/jksii.2018.19.5.21