Art
J-GLOBAL ID:202102282752566693   Reference number:21A0253500

Proposal of Malware Classification Using Correlation between API Groups and File Path Operation Frequency

APIグループ間の相関性とフォルダ操作頻度に基づくマルウェア分類手法の提案
Author (5):
Material:
Volume: 61  Issue: 12  Page: 1792-1801 (WEB ONLY)  Publication year: Dec. 15, 2020 
JST Material Number: U0452A  ISSN: 1882-7764  Document type: Article
Article type: 原著論文  Country of issue: Japan (JPN)  Language: JAPANESE (JA)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

JST classification (2):
JST classification
Category name(code) classified by JST.
Data protection  ,  Computer system operational management 
Reference (37):
  • Malcolm, J.: History of Malwa, A Mem. Cent. India, pp.22-57 (2011).
  • BitDefender: Malware History, available from https://download.bitdefender.com/resources/files/Main/file/Malware_History.pdf (accessed 2020-02-11).
  • Malwarebytes LABS: 2019 State of Malware, available from https://resources.malwarebytes.com/files/2019/01/Malwarebytes-Labs-2019-State-of-Malware-Report2.pdf (accessed 2020-02-11).
  • Fan, C.I., Hsiao, H.W., Chou, C.H. and Tseng, Y.F.: Malware detection systems based on API log data mining, International Computer Software and Applications Conference (2015).
  • Alazab, M., Venkataraman, S. and Watters, P.: Towards understanding malware behaviour by the extraction of API calls, 2nd Cybercrime and Trustworthy Computing Workshop (CTC 2010 ), pp.52-59 (2010).
more...

Return to Previous Page