{"title":"聚类多态恶意软件跟踪","authors":"A. Sarvani, B. Venugopal, D. Nagaraju","doi":"10.1109/ICAMMAET.2017.8186641","DOIUrl":null,"url":null,"abstract":"A common threat for maximum computers today are due to malwares. In recent years attackers created different types of malwares which has become a challenge for many anti malware software. The malware companies have generated various forms of same malware. The different forms of the same malware will have similar functionality and same behaviour but with various representation. Here we cluster (group) the similar behaviour malware using number of distance measure. For clustering (group) malware samples we have many approaches which are published. There by different similarity measures are used but without thoroughly discussing their choice. Here we discuss about various similarity measure and their properties to get the accurate output. Our main focus is on behavioural features of malware and compare. Here we have used K means for clustering the malware samples.","PeriodicalId":425974,"journal":{"name":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Clustering the polymorphic malware traces\",\"authors\":\"A. Sarvani, B. Venugopal, D. Nagaraju\",\"doi\":\"10.1109/ICAMMAET.2017.8186641\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A common threat for maximum computers today are due to malwares. In recent years attackers created different types of malwares which has become a challenge for many anti malware software. The malware companies have generated various forms of same malware. The different forms of the same malware will have similar functionality and same behaviour but with various representation. Here we cluster (group) the similar behaviour malware using number of distance measure. For clustering (group) malware samples we have many approaches which are published. There by different similarity measures are used but without thoroughly discussing their choice. Here we discuss about various similarity measure and their properties to get the accurate output. Our main focus is on behavioural features of malware and compare. Here we have used K means for clustering the malware samples.\",\"PeriodicalId\":425974,\"journal\":{\"name\":\"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAMMAET.2017.8186641\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAMMAET.2017.8186641","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A common threat for maximum computers today are due to malwares. In recent years attackers created different types of malwares which has become a challenge for many anti malware software. The malware companies have generated various forms of same malware. The different forms of the same malware will have similar functionality and same behaviour but with various representation. Here we cluster (group) the similar behaviour malware using number of distance measure. For clustering (group) malware samples we have many approaches which are published. There by different similarity measures are used but without thoroughly discussing their choice. Here we discuss about various similarity measure and their properties to get the accurate output. Our main focus is on behavioural features of malware and compare. Here we have used K means for clustering the malware samples.