Browse > Article
http://dx.doi.org/10.9708/jksci.2014.19.7.077

A Realtime Malware Detection Technique Using Multiple Filter  

Park, Jae-Kyung (Cyber Security Research Center in KAIST)
Abstract
Recently, several environment damage caused by malicious or suspicious code is increasing. We study comprehensive response system actively for malware detection. Suspicious code is installed on your PC without your consent, users are unaware of the damage. Also, there are need to technology for realtime processing of Big Data. We must develope advanced technology for malware detection. We must analyze the static, dynamic of executable file for fundamentally malware detection in recently and verified by a reputation for verification. It is need to judgment of similarity for realtime response with big data. In this paper, we proposed realtime detection and verification technology using multiple filter. Our malware study suggests a new direction of realtime malware detection.
Keywords
Malware; Suspicious Code; Detection; Verify; Multiple Filter;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Provos, N., McNamee, D., Mavrommatis, P., Wang, K., and Modadugu, N. "The ghost in the browser analysis of web-based malware, " Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pp. 4-4, Apr. 2007.
2 http://www.ahnlab.com/kr/site/securityinfo/secunews/secuNewsView.do?menu_dist=2&seq=22325
3 Hyo-Nam Kim, Realtime hybrid analysis based on multiple profile for prevention of malware, Hongik Univ., Feb. 2014
4 Jin-Kyung Kim, A design of anomaly detection with automata dynamic profile, Hansei Univ., Feb. 2014
5 Chen, K.Z., Gu, G., Zhuge, J., Nazario, J., and Han, X.., "WebPatrol: Automated collection and replay of web-based malware scenarios," Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp.186-195, Mar. 2011.
6 Sang-Yong Choi, Multi-level emulation for malware distribution networks analysis, Journal of The Korea Institute of Information Security & Cryptology, VOL.23, NO.6, Dec. 2013.   과학기술학회마을   DOI   ScienceOn
7 Chang-Wook Park, First URL lookup using URL prefix hash tree, Journal of The Korea Institute of Information Science, Vol. 35, No.1, pp. 67-75, Oct. 2007.
8 https://www.Malwares.com
9 SpiderMonkey, "https://developer.mozilla.org/en-US/ docs/Mozilla/Projects/SpiderMonkey"
10 Yongwook Lee, Design and implementation of web-browser based malicious behavior detection system(WMDS), Journal of The Korea Institute of Information Security & Cryptology, Vol.22, No.3, pp. 667-677, Jun. 2012.
11 Manuel Egele, Peter Wurzinger, Christopher Kruegel, and Engin Kirda, Defending Browsers against Drive-by Downloads: Mitigating Heap-spraying Code Injection Attacks, ACM New York, pp. 281-290, 2010.
12 https://www.VirusTotal.com