Abstract | ||
---|---|---|
Previous work has shown that cluster analysis can be used to effectively classify malware into meaningful families. In this research, we apply cluster analysis to the challenging problem of classifying previously unknown malware. We perform several experiments involving malware clustering. We compare our clustering results to those obtained when a support vector machine (SVM) is trained on the malware family. Using clustering, we are able to classify malware with an accuracy comparable to that of an SVM. An advantage of the clustering approach is that a new malware family can be classified before a model has been trained specifically for the family. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1007/s11416-015-0253-z | J. Computer Virology and Hacking Techniques |
Field | DocType | Volume |
Receiver operating characteristic,Pattern recognition,Expectation–maximization algorithm,Computer science,Support vector machine,Artificial intelligence,Malware,Cluster analysis,Machine learning | Journal | 12 |
Issue | ISSN | Citations |
4 | 2263-8733 | 2 |
PageRank | References | Authors |
0.38 | 12 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
usha narra | 1 | 2 | 0.38 |
fabio di troia | 2 | 2 | 0.38 |
visaggio aaron corrado | 3 | 2 | 0.38 |
Thomas H. Austin | 4 | 307 | 15.96 |
Mark Stamp | 5 | 513 | 33.32 |