Fig. 1. MapReduce Structure
Fig. 2. Hadoop Install – openssh-server
Fig. 3. Spark Install – Variable Edit
Fig. 4. Function Structure
Fig. 5. Create Session
Fig. 6. Loading Datasets
Fig. 7. Result of Sorting
Fig. 8. Result of Clustrings
Fig. 9. Algorithm Flow
Fig. 10. Datasets Classfy
Fig. 11. Keywords
Fig. 12. Datasets ReAllocate
Fig. 13. Result of Experiment
References
- Malware Images: Visualization and Automatic Classification, https://vision.ece.ucsb.edu/research/signal-processing-malware-analysis
- S. H. Seok. (2016). Malware Family Classify of Convolution Neural Network using Imagification. Journal of the Korea Institute of Information Security & Cryptology, 26(1).
- H. J. Kim & E. J. Yoon. (2017). AI Deep Learning protection of Malware Imagification. Journal of The Institute of Electronics and Information Engineers, 54(2).
- J. H. Kwon. (2011). Malware detection of Various code using Action Graph. Security of Information Society Journal, 21(2).
- C. K. Kong. (2011). Malware Host Detection using Spam Mail Analysis. Korea Internet & Security Agency Final Report.
- K. S. Kim. (2018). Malware Analysis Algorithm using Machine Learning. International Journal of Engineering & Technology, 7(2.12), 80-83.
- T. K. Kwon. (2016). Maleware Various Group Classfy using Data Mining. Korea Internet & Security Agency Final Report.
- E. K. Yang. (2010). Deveop of Performance Factor and Collect of Malware Analysis. Korea Internet & Security Agency Final Report.
- J. S. Moon. (2010). Neutralization Algorithm Study using Execution Self-Compression file. Korea Internet & Security Agency Final Report.
- B. I, Kim. (2018), A Study on Cyber Threat Intelligence Analysis (CTI) Platform for Proactive Detection of Cyber Attacks Based on Automated Analysis. The Journal of Korea Telecom Society, Fall Symposium, 578-579.
- B. I, Kim. (2016), A Study on the ID Management System of Cyber Threat and its Relevant Information for Cyber Threat Intelligent Analysis. The Journal of Korea Telecom Society, Winter Symposium, 959-960.
- Daesung Moon, Hansung Lee, (2014), "Feature Extraction for Host based Anomaly Detection", The Journal of Korea Electronics Society, Summer Symposium, 591-594
- D. H. Kim & K. S. Kim. (2018). DGA-DNS Similarity Analysis and APT Attack Detection Using N-gram. The Journal of Korea Computer Secret Society, 28(5), 591-594.
- D. G. Kim & C. H. Kim. (2018). Study on APT Attack Response Techniques Based on Big Data Analysis. The Journal of Society of Convergence Knowledge, 4(1), 29-34.
- Splunk Product Bries. (2018). Splunk Enterprise Security. https://www.splunk.com/pdfs/product-briefs/splunk-enterprise-security.pdf