The staggering increase of malware families and their di- versity poses a significant threat and creates a compelling need for automatic classification techniques. In this paper, we first analyze the role of network behavior as a pow- erful technique to automatically classify malware families and their polymorphic variants. Afterwards, we present a framework to efficiently classify malware families by mod- eling their different network behaviors (such as HTTP, SMTP, UDP, and TCP). We propose protocol-aware and state-space modeling schemes to extract features from malware network behaviors. We analyze the applicability of various evolu- tionary and non-evolutionary algorithms for our malware family classification framework. To evaluate our f...
With malware becoming more and more diused and at the same time more sophisticatedin its attack tech...
With malware becoming more and more diused and at the same time more sophisticatedin its attack tech...
Malware family labels are known to be inconsistent. They are also black-box since they do not repres...
The staggering increase of malware families and their di- versity poses a significant threat and cre...
Anti-malware vendors receive daily thousands of potentially malicious binaries to analyse and catego...
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major thre...
Anti-malware vendors receive daily thousands of potentially malicious binaries to analyse and catego...
Modern malware is designed with mutation characteristics, namely polymorphism and metamorphism, whic...
Modern malware is designed with mutation characteristics, namely polymorphism and metamorphism, whic...
This paper distinguishes malware families from a specific category (i.e., ransomware) via dynamic an...
This paper distinguishes malware families from a specific category (i.e., ransomware) via dynamic an...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
As the security landscape evolves over time, where thousands of species of malicious codes are seen ...
The voluminous malware variants that appear in the Internet have posed severe threats to its securit...
The skyrocketing growth rate of new malware brings novel challenges to protect computers and network...
With malware becoming more and more diused and at the same time more sophisticatedin its attack tech...
With malware becoming more and more diused and at the same time more sophisticatedin its attack tech...
Malware family labels are known to be inconsistent. They are also black-box since they do not repres...
The staggering increase of malware families and their di- versity poses a significant threat and cre...
Anti-malware vendors receive daily thousands of potentially malicious binaries to analyse and catego...
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major thre...
Anti-malware vendors receive daily thousands of potentially malicious binaries to analyse and catego...
Modern malware is designed with mutation characteristics, namely polymorphism and metamorphism, whic...
Modern malware is designed with mutation characteristics, namely polymorphism and metamorphism, whic...
This paper distinguishes malware families from a specific category (i.e., ransomware) via dynamic an...
This paper distinguishes malware families from a specific category (i.e., ransomware) via dynamic an...
Abstract New and unseen polymorphic malware, zero-day attacks, or other types of advanced persistent...
As the security landscape evolves over time, where thousands of species of malicious codes are seen ...
The voluminous malware variants that appear in the Internet have posed severe threats to its securit...
The skyrocketing growth rate of new malware brings novel challenges to protect computers and network...
With malware becoming more and more diused and at the same time more sophisticatedin its attack tech...
With malware becoming more and more diused and at the same time more sophisticatedin its attack tech...
Malware family labels are known to be inconsistent. They are also black-box since they do not repres...