首页> 外文会议>2010 Second International Conference on Advances in Computing, Control and Telecommunication Technologies >Integrating Dynamic Analysis Using Clustering Techniques for local Malware in Indonesia
【24h】

Integrating Dynamic Analysis Using Clustering Techniques for local Malware in Indonesia

机译:使用聚类技术对印度尼西亚本地恶意软件进行动态分析集成

获取原文

摘要

The understanding and predict threats to the security of information systems become really important in order to protect critical systems. Protection against the threat of computer threats have been adequately considered with anti-virus software which resulted in an increase in world surveys from CSI Survey 2008 for the use of security technologies against malware is that the use of antivirus stand in the first position with 97% usage rate. Malware has several characteristics and behavior that vary according to the programming techniques and objectives of the creator of the virus. Protection so that the system efficacy rely solely on antivirus software alone, not be considered sufficient. local malware have got a lot of attention to be seriously considered. This can be proofed with contribution and sharing information of Indonesia computer security communities and professional, Indonesia CERT, and also antivirus vendor consist of worldwide antivirus vendor and local antivirus vendor . local malware is not different from the other malware in the world that it is a potential threat. This research will focus on local malware analysis using data mining especially with clustering techniques and conducted to serve objective of analyzing local malwares characteristics/behaviors. This research propose Self-Organizing Map (SOM) and Simple K-means as the clustering analysis techniques.
机译:为了保护关键系统,了解和预测对信息系统安全的威胁变得非常重要。防病毒软件已充分考虑了防范计算机威胁的措施,这使CSI Survey 2008上的世界调查增加了,针对使用安全技术来防御恶意软件的情况是,使用防病毒软件的使用率居第一,占97%使用率。恶意软件具有多种特征和行为,这些特征和行为会根据编程技术和病毒创建者的目标而有所不同。进行保护以使系统功效仅依赖于防病毒软件是不够的。本地恶意软件引起了很多关注,需要认真考虑。印度尼西亚计算机安全社区和专业人士印度尼西亚CERT的贡献和共享信息可以证明这一点,并且防病毒厂商还包括全球防病毒厂商和本地防病毒厂商。本地恶意软件与世界上其他恶意软件没有什么不同,它是潜在的威胁。这项研究将专注于使用数据挖掘(尤其是使用聚类技术)进行本地恶意软件分析,并旨在分析本地恶意软件的特征/行为。这项研究提出了自组织图(SOM)和简单K均值作为聚类分析技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号