Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls


Citar

Texto integral

Acesso aberto Acesso aberto
Acesso é fechado Acesso está concedido
Acesso é fechado Somente assinantes

Resumo

The use of clustering algorithms to determine the types of malicious software files based on the analysis of the WinAPI function call sequences is investigated. The use of clustering algorithms such as k-means, EM-algorithm, hierarchical algorithm, and the affinity propagation method is considered. The quality of clustering is evaluated using the silhouette metrics, the Calinski–Harabasz index, and the Davies–Bouldin index.

Sobre autores

R. Ognev

Peter the Great St. Petersburg Polytechnic University (SPbPU)

Email: dmitry@ibks.spbstu.ru
Rússia, St. Petersburg, 195251

E. Zhukovskii

Peter the Great St. Petersburg Polytechnic University (SPbPU)

Autor responsável pela correspondência
Email: spbzhuk@gmail.com
Rússia, St. Petersburg, 195251

D. Zegzhda

Peter the Great St. Petersburg Polytechnic University (SPbPU)

Autor responsável pela correspondência
Email: dmitry@ibks.spbstu.ru
Rússia, St. Petersburg, 195251

Arquivos suplementares

Arquivos suplementares
Ação
1. JATS XML

Declaração de direitos autorais © Allerton Press, Inc., 2019