Browse > Article

A Study on Malicious Codes Grouping and Analysis Using Visualization  

Song, In-Soo (경기대학교 산업기술보호특화센터)
Lee, Dong-Hui (경기대학교 산업기술보호특화센터)
Kim, Kui-Nam (경기대학교 산업기술보호특화센터)
Publication Information
Abstract
The expansion of internet technology has made convenience. On the one hand various malicious code is produced. The number of malicious codes occurrence has dramadically increasing, and new or variant malicious code circulation very serious, So it is time to require analysis about malicious code. About malicious code require set criteria for judgment, malicious code taxonomy using Algorithm of weakness difficult to new or variant malicious code taxonomy but already discovered malicious code taxonomy is effective. Therefore this paper of object is various malicious code analysis besides new or variant malicious code type or form deduction using visualization of strong. Thus this paper proposes a malicious code analysis and grouping method using visualization.
Keywords
Malicious Codes; Malicious Codes Regrouping; Visualization; Parallel Coordinates;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Stephen Few, "Multivariate Analysis Using Parallel Coordinates", Perceptual edge, 2006.
2 H Choi, H. Lee, "PCAV:Internet attack visualization on parallel coordinates", Springer, Information and Communications Security, 2005.
3 Rawiroj Robert Kasemsri, and Ying Zhu, "A Survey, Taxonomy, and Analysis of Network Security Visualization Techniques", Citeseer, 2005.
4 Nwokedi, Aditya P. Mathur, "A Survey of Malware Detection Techniques", Citeseer, Purdue University, 2007.
5 http://www.cve.mitre.org/.
6 서희석, 최중섭, 주필환, "윈도우 악성코드 분류 시스템에 관한 연구", 한국시뮬레이션학회논문지, 제18권, 제1호, pp. 63-70, 2009.   과학기술학회마을
7 배성재, 권오철, 문종섭, 조재익, "Native API 빈도 기반의 퍼지 군집화를 이용한 악성코드 재그 룹화 기법연구", 정보보호학회논문지, 제18권, 제6호, pp. 115-127, 2008.   과학기술학회마을
8 장영준, 차민석, 정진성, 조시행, "악성코드 동향과 그 미래 전망", 정보보호학회논문지, 제18권, 제3호, pp. 1-16.   과학기술학회마을
9 Daniel A. Keim, "Information Visualization and Visual Data Mining", IEEE transactions on visualization and computer graphics, Vol. 7, No. 1, 2002.
10 MO Ward, "XmdvTool:Integrating multiple methods for visualizing multivariate data", portal.acm.org, 1994.
11 서희석, 최중섭, 주필환, "윈도우 악성코드 분류 방법론의 설계", 정보보호학회논문지, 제19권 제2호, pp. 88-92, 2009.   과학기술학회마을
12 안철수 연구소, "ASEC_Annual_Report", 2009 -2010.
13 E Skoudis and L Zeltser, "Malware:Fighting malicious code", books.google.com, 2004.