A large amount of new malware is constantly being generated, which must not only be distinguished from benign samples, but also classified into malware families. For this purpose, investigating how existing malware families are developed and examining emerging families need to be explored. This paper focuses on the online processing of incoming malicious samples to assign them to existing families or, in the case of samples from new families, to cluster them. We experimented with seven prevalent malware families from the EMBER dataset, four in the training set and three additional new families in the test set. Based on the classification score of the multilayer perceptron, we determined which samples would be classified and which would be c...
Zero-day or unknown malware are created using code obfuscation techniques that can modify the parent...
AbstractThe metamorphic malware variants with the same malicious behavior (family), can obfuscate th...
abstract: Malware forensics is a time-consuming process that involves a significant amount of data c...
The skyrocketing growth rate of new malware brings novel challenges to protect computers and network...
The skyrocketing grow rate of new malware brings novel challenges to protect computers and networks....
Malware undoubtedly have become a major threat in modern society and their numbers are growing daily...
Identifying families of malware is today considered a fundamental problem in the context of computer...
Malware samples has increased exponentially over the years, and there is a need to improve the effic...
Malicious software – so called malware – poses a major threat to the security of computer systems. T...
Malware has been one of the key concerns for Information Technology security researchers for decades...
In this paper we fully describe a novel clustering method for malware, from the transformation of da...
Anti-malware companies receive thousands of malware samples every day. To process this large quantit...
Malware family labels are known to be inconsistent. They are also black-box since they do not repres...
In this paper we fully describe a novel clustering method for malware, from the transformation of da...
We identify a new method for detecting malware within a network that can be processed in linear time...
Zero-day or unknown malware are created using code obfuscation techniques that can modify the parent...
AbstractThe metamorphic malware variants with the same malicious behavior (family), can obfuscate th...
abstract: Malware forensics is a time-consuming process that involves a significant amount of data c...
The skyrocketing growth rate of new malware brings novel challenges to protect computers and network...
The skyrocketing grow rate of new malware brings novel challenges to protect computers and networks....
Malware undoubtedly have become a major threat in modern society and their numbers are growing daily...
Identifying families of malware is today considered a fundamental problem in the context of computer...
Malware samples has increased exponentially over the years, and there is a need to improve the effic...
Malicious software – so called malware – poses a major threat to the security of computer systems. T...
Malware has been one of the key concerns for Information Technology security researchers for decades...
In this paper we fully describe a novel clustering method for malware, from the transformation of da...
Anti-malware companies receive thousands of malware samples every day. To process this large quantit...
Malware family labels are known to be inconsistent. They are also black-box since they do not repres...
In this paper we fully describe a novel clustering method for malware, from the transformation of da...
We identify a new method for detecting malware within a network that can be processed in linear time...
Zero-day or unknown malware are created using code obfuscation techniques that can modify the parent...
AbstractThe metamorphic malware variants with the same malicious behavior (family), can obfuscate th...
abstract: Malware forensics is a time-consuming process that involves a significant amount of data c...