Anti-virus systems traditionally use signatures to detect malicious executables, but signatures are over-fitted features that are of little use in machine learning. Other more heuristic methods seek to utilize more general features, with some degree of success. In this paper, we present a data mining approach that conducts an exhaustive feature search on a set of computer viruses and strives to obviate over-fitting. We also evaluate the predictive power of a classifier by taking into account dependence relationships that exist between viruses, and we show that our classifier yields high detection rates and can be expected to perform as well in real-world conditions
Abstract. The ever-growing malware threat in the cyber space calls for tech-niques that are more eff...
There exist different methods of identifying malware, and widespread method is the one found in almo...
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major thre...
Computer viruses have existed since the early days of personal computers, and have since become a ub...
Detecting unknown viruses is a challenging research topic. Data mining approaches have been used to ...
Malwares are growing exponentially in number, and authors of malwares are continuously releasing new...
Machine learning techniques are widely used in many fields. One of the applications of machine learn...
Malicious executables are computer programs, which may cause damages or inconveniences for computer ...
Detecting unknown viruses is a challenging research topic. Data mining approaches have been used to ...
Malicious software, sometimes known as malware, is software designed to harm a computer, network, or...
Owing to the lack of prevention ability of traditional anti-virus methods, a behavior-based virus pr...
A serious security threat today is malicious executables, especially new, unseen malicious executabl...
The widespread use of the Internet has caused computer security to become an important issue. Curren...
In this paper, we present a novel approach to detect unknown virus using dynamic instruction sequenc...
We describe the use of machine learning and data mining to detect and classify malicious executables...
Abstract. The ever-growing malware threat in the cyber space calls for tech-niques that are more eff...
There exist different methods of identifying malware, and widespread method is the one found in almo...
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major thre...
Computer viruses have existed since the early days of personal computers, and have since become a ub...
Detecting unknown viruses is a challenging research topic. Data mining approaches have been used to ...
Malwares are growing exponentially in number, and authors of malwares are continuously releasing new...
Machine learning techniques are widely used in many fields. One of the applications of machine learn...
Malicious executables are computer programs, which may cause damages or inconveniences for computer ...
Detecting unknown viruses is a challenging research topic. Data mining approaches have been used to ...
Malicious software, sometimes known as malware, is software designed to harm a computer, network, or...
Owing to the lack of prevention ability of traditional anti-virus methods, a behavior-based virus pr...
A serious security threat today is malicious executables, especially new, unseen malicious executabl...
The widespread use of the Internet has caused computer security to become an important issue. Curren...
In this paper, we present a novel approach to detect unknown virus using dynamic instruction sequenc...
We describe the use of machine learning and data mining to detect and classify malicious executables...
Abstract. The ever-growing malware threat in the cyber space calls for tech-niques that are more eff...
There exist different methods of identifying malware, and widespread method is the one found in almo...
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major thre...