머신러닝 기반 보안데이터 분석 연구 |
Lee, Seek
(국민대학교 컴퓨터공학과)
Kim, DongHoon (국민대학교 컴퓨터공학과) Cho, YoungHun (국민대학교 컴퓨터공학과) Myung, JoonWoo (국민대학교 컴퓨터공학과) Moon, DaMin (국민대학교 컴퓨터공학과) Lee, JaeKoo (국민대학교 컴퓨터공학과) Yoon, MyungKeun (국민대학교 컴퓨터공학과) |
1 | Microsoft Malware Prediction, 2019, https://www.kaggle.com/c/microsoft-malware-prediction |
2 | http://datachallenge.kr/ |
3 | http://ocslab.hksecurity.net/Datasets |
4 | M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, "A Detailed Analysis of the KDD CUP 99 Data Set," Proceedings of the IEEE CSIDA'09 |
5 | Canadian Institute for Cybersecurity, https://www.unb.ca/cic/datasets/index.html |
6 | 2011-2013 VAST Cyber Challenge: Computer Network Operations at All Freight Corporation, http://www.vacommunity.org/2011+-+2013+VAST+Cyber+Challenges |
7 | E. Rezende, G. Ruppert, T. Carvalho, F. Ramos and P. Geus, "Malicious Software Classification Using Transfer Learning of ResNet-50 Deep Neural Network," in Proceedings of the IEEE ICMLA'17 |
8 | X. Ugarte-pedrero, M. Graziano, and D. Balzarotti, "A Close Look at a Daily Dataset of Malware Samples," ACM Transactions on Privacy and Security, Vol. 22, Jan., 2019 |
9 | Kaspersky, "Machine Learning for Malware Detection," 2017 |
10 | S. Khatuya, N. Ganguly, J. Basak, M. Bharde, and B. Mitra, "ADELE: Anomaly Detection from Event Log Empiricism," Proceedings of IEEE INFOCOM'18 |
11 | Microsoft Malware Winners' Interview, http://blog.kaggle.com/2015/05/26/microsoft-malware-winners-interview-1st-place-no-to-overfitting/ |
12 | KDD Cup 1999: Computer network intrusion detection, https://www.kdd.org/kdd-cup/view/kdd-cup-1999/Data |
13 | Y. Shen, E. Mariconti, P. Vervier, and G.Stringhini, "Tiresias: Predicting Security Events Through Deep Learning," Proceedings of ACM CCS'18 |
14 | Z. Cui, F. Xue, Y. Cao, and G. Wanf, "Detection of Malicious Code Variants Based on Deep Learning", IEEE Trans. on Industrial Informatics, Vol.14, No.7, 2018 |
15 | M. Du, F. Li, G. Zheng, V. Srikumar, "DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning," Proceedings of ACM CCS'17 |
16 | Z. Li, D. Zou, S. Xu, X. Ou, H. Jin, S. Wang, Z. Deng, and Y. Zhong, "VulDeePecker: A Deep Learning-Based System for Vulnerability Detection," NDSS'18 |
17 | E. Raff, J. Barker, J. Sylvester, R. Brandon, B. Catanzaro, and C. Nicholas, "Malwrae Detection by Eating a whole EXE," AAAI Workshop on Artificial Intelligence for Cyber Security, 2018 |
18 | R. Ronen, M. Radu, C. Feuerstein, E. Yom-Tov, and M. Ahmadi, "Microsoft Malware Classification Challenge," https://arxiv.org/abs/1802.10135 |