Browse > Article

머신러닝 기반 보안데이터 분석 연구  

Lee, Seek (국민대학교 컴퓨터공학과)
Kim, DongHoon (국민대학교 컴퓨터공학과)
Cho, YoungHun (국민대학교 컴퓨터공학과)
Myung, JoonWoo (국민대학교 컴퓨터공학과)
Moon, DaMin (국민대학교 컴퓨터공학과)
Lee, JaeKoo (국민대학교 컴퓨터공학과)
Yoon, MyungKeun (국민대학교 컴퓨터공학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Microsoft Malware Prediction, 2019, https://www.kaggle.com/c/microsoft-malware-prediction
2 http://datachallenge.kr/
3 http://ocslab.hksecurity.net/Datasets
4 M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, "A Detailed Analysis of the KDD CUP 99 Data Set," Proceedings of the IEEE CSIDA'09
5 Canadian Institute for Cybersecurity, https://www.unb.ca/cic/datasets/index.html
6 2011-2013 VAST Cyber Challenge: Computer Network Operations at All Freight Corporation, http://www.vacommunity.org/2011+-+2013+VAST+Cyber+Challenges
7 E. Rezende, G. Ruppert, T. Carvalho, F. Ramos and P. Geus, "Malicious Software Classification Using Transfer Learning of ResNet-50 Deep Neural Network," in Proceedings of the IEEE ICMLA'17
8 X. Ugarte-pedrero, M. Graziano, and D. Balzarotti, "A Close Look at a Daily Dataset of Malware Samples," ACM Transactions on Privacy and Security, Vol. 22, Jan., 2019
9 Kaspersky, "Machine Learning for Malware Detection," 2017
10 S. Khatuya, N. Ganguly, J. Basak, M. Bharde, and B. Mitra, "ADELE: Anomaly Detection from Event Log Empiricism," Proceedings of IEEE INFOCOM'18
11 Microsoft Malware Winners' Interview, http://blog.kaggle.com/2015/05/26/microsoft-malware-winners-interview-1st-place-no-to-overfitting/
12 KDD Cup 1999: Computer network intrusion detection, https://www.kdd.org/kdd-cup/view/kdd-cup-1999/Data
13 Y. Shen, E. Mariconti, P. Vervier, and G.Stringhini, "Tiresias: Predicting Security Events Through Deep Learning," Proceedings of ACM CCS'18
14 Z. Cui, F. Xue, Y. Cao, and G. Wanf, "Detection of Malicious Code Variants Based on Deep Learning", IEEE Trans. on Industrial Informatics, Vol.14, No.7, 2018
15 M. Du, F. Li, G. Zheng, V. Srikumar, "DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning," Proceedings of ACM CCS'17
16 Z. Li, D. Zou, S. Xu, X. Ou, H. Jin, S. Wang, Z. Deng, and Y. Zhong, "VulDeePecker: A Deep Learning-Based System for Vulnerability Detection," NDSS'18
17 E. Raff, J. Barker, J. Sylvester, R. Brandon, B. Catanzaro, and C. Nicholas, "Malwrae Detection by Eating a whole EXE," AAAI Workshop on Artificial Intelligence for Cyber Security, 2018
18 R. Ronen, M. Radu, C. Feuerstein, E. Yom-Tov, and M. Ahmadi, "Microsoft Malware Classification Challenge," https://arxiv.org/abs/1802.10135