Rocky Christian, Charles Lim, A. Nugroho, M. Kisworo
{"title":"利用聚类技术集成动态分析印尼本地恶意软件","authors":"Rocky Christian, Charles Lim, A. Nugroho, M. Kisworo","doi":"10.1109/ACT.2010.30","DOIUrl":null,"url":null,"abstract":"The understanding and predict threats to the security of information systems become really important in order to protect critical systems. Protection against the threat of computer threats have been adequately considered with anti-virus software which resulted in an increase in world surveys from CSI Survey 2008 for the use of security technologies against malware is that the use of antivirus stand in the first position with 97% usage rate. Malware has several characteristics and behavior that vary according to the programming techniques and objectives of the creator of the virus. Protection so that the system efficacy rely solely on antivirus software alone, not be considered sufficient. local malware have got a lot of attention to be seriously considered. This can be proofed with contribution and sharing information of Indonesia computer security communities and professional, Indonesia CERT, and also antivirus vendor consist of worldwide antivirus vendor and local antivirus vendor . local malware is not different from the other malware in the world that it is a potential threat. This research will focus on local malware analysis using data mining especially with clustering techniques and conducted to serve objective of analyzing local malwares characteristics/behaviors. This research propose Self-Organizing Map (SOM) and Simple K-means as the clustering analysis techniques.","PeriodicalId":147311,"journal":{"name":"2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Integrating Dynamic Analysis Using Clustering Techniques for local Malware in Indonesia\",\"authors\":\"Rocky Christian, Charles Lim, A. Nugroho, M. Kisworo\",\"doi\":\"10.1109/ACT.2010.30\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The understanding and predict threats to the security of information systems become really important in order to protect critical systems. Protection against the threat of computer threats have been adequately considered with anti-virus software which resulted in an increase in world surveys from CSI Survey 2008 for the use of security technologies against malware is that the use of antivirus stand in the first position with 97% usage rate. Malware has several characteristics and behavior that vary according to the programming techniques and objectives of the creator of the virus. Protection so that the system efficacy rely solely on antivirus software alone, not be considered sufficient. local malware have got a lot of attention to be seriously considered. This can be proofed with contribution and sharing information of Indonesia computer security communities and professional, Indonesia CERT, and also antivirus vendor consist of worldwide antivirus vendor and local antivirus vendor . local malware is not different from the other malware in the world that it is a potential threat. This research will focus on local malware analysis using data mining especially with clustering techniques and conducted to serve objective of analyzing local malwares characteristics/behaviors. This research propose Self-Organizing Map (SOM) and Simple K-means as the clustering analysis techniques.\",\"PeriodicalId\":147311,\"journal\":{\"name\":\"2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies\",\"volume\":\"99 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ACT.2010.30\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACT.2010.30","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Integrating Dynamic Analysis Using Clustering Techniques for local Malware in Indonesia
The understanding and predict threats to the security of information systems become really important in order to protect critical systems. Protection against the threat of computer threats have been adequately considered with anti-virus software which resulted in an increase in world surveys from CSI Survey 2008 for the use of security technologies against malware is that the use of antivirus stand in the first position with 97% usage rate. Malware has several characteristics and behavior that vary according to the programming techniques and objectives of the creator of the virus. Protection so that the system efficacy rely solely on antivirus software alone, not be considered sufficient. local malware have got a lot of attention to be seriously considered. This can be proofed with contribution and sharing information of Indonesia computer security communities and professional, Indonesia CERT, and also antivirus vendor consist of worldwide antivirus vendor and local antivirus vendor . local malware is not different from the other malware in the world that it is a potential threat. This research will focus on local malware analysis using data mining especially with clustering techniques and conducted to serve objective of analyzing local malwares characteristics/behaviors. This research propose Self-Organizing Map (SOM) and Simple K-means as the clustering analysis techniques.