• Tidak ada hasil yang ditemukan

references - SGU Repository

N/A
N/A
Protected

Academic year: 2023

Membagikan "references - SGU Repository"

Copied!
4
0
0

Teks penuh

(1)

COMPARISON OF BEHAVIOR ANALYSIS SANDBOXES USING VARIOUS

MACHINE LEARNING ALGORITHMS FOR MALWARE DETECTION Page 59 of 76

REFERENCES

Alazab, M., Layton, R., Venkataraman, S., and Watters, P., “Malware detection based on structural and behavioural features of API calls,” International Cyber Resilience Conference, 2010.

Alazab, M., Venkatraman, S., Watters, P., and Alazab, M., “Zero-day malware detec- tion based on supervised learning algorithms of api call signatures,” in “Proceedings of the Ninth Australasian Data Mining Conference-Volume 121,” pp. 171–182, Australian Computer Society, Inc., 2011.

AV-test, “Malware Growth in Last 10 Years,” , 2015, URLhttp://www.av-test.

org/en/statistics/malware/, accessed: 2015-06-03.

Aycock, J., Computer viruses and malware, volume 22, Springer Science & Business Media, 2006.

Bai, H., Hu, C.-z., Jing, X.-c., Li, N., and Wang, X.-y., “Approach for malware identi- fication using dynamic behaviour and outcome triggering,” Information Security, IET, volume 8(2) pp. 140–151, 2014.

Chloe Albanesius, L. S., “Report: Stuxnet Worm Attacks Iran, Who is Behind It?”

, 2010, URL http://www.pcmag.com/article2/0,2817,2369745,00.

asp, accessed: 2015-06-01.

Christodorescu, M. and Jha, S., “Static analysis of executables to detect malicious pat- terns,” Technical report, DTIC Document, 2006.

Cuckoo Developers, “Cuckoo Sandbox - open source automated malware analysis,”

Blackhat US Workshop, 2013.

Cuckoo Foundation, “Cuckoo Sandbox,” , 2015, URLhttp://cuckoosandbox.

org/, accessed: 2015-05-19.

Domingos, P., “A few useful things to know about machine learning,”Communications of the ACM, volume 55(10) pp. 78–87, 2012.

Joshua Tommy Juwono

(2)

COMPARISON OF BEHAVIOR ANALYSIS SANDBOXES USING VARIOUS

MACHINE LEARNING ALGORITHMS FOR MALWARE DETECTION Page 60 of 76

Dornhackl, H., Kadletz, K., Luh, R., and Tavolato, P., “Malicious behavior patterns,”

in “2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE),” pp. 384–389, IEEE, 2014.

Düssel, P., Holz, T., Laskov, P., Rieck, K., and Willems, C., “Learning and Classifica- tion of Malware Behavior,” , 2009.

Egele, M., Scholte, T., Kirda, E., and Kruegel, C., “A survey on automated dy- namic malware-analysis techniques and tools,”ACM Computing Surveys (CSUR), vol- ume 44(2) p. 6, 2012.

Ernst, M. D., “Static and dynamic analysis: Synergy and duality,” in “WODA 2003:

ICSE Workshop on Dynamic Analysis,” pp. 24–27, Citeseer, 2003.

Fawcett, T., “An introduction to ROC analysis,” Pattern recognition letters, vol- ume 27(8) pp. 861–874, 2006.

Fayyad, U., Piatetsky-Shapiro, G., and Smyth, P., “From data mining to knowledge discovery in databases,”AI magazine, volume 17(3) p. 37, 1996.

Firdausi, I., Analysis Of Machine Learning Techniques Used In Behavior-Based Mal- ware Detection, Bachelor thesis, Swiss German University, 2010.

Firdausi, I., Lim, C., Erwin, A., and Nugroho, A. S., “Analysis of machine learning techniques used in behavior-based malware detection,” in “Advances in Computing, Control and Telecommunication Technologies (ACT), 2010 Second International Con- ference on,” pp. 201–203, IEEE, 2010.

Iseclab, “Anubis - Learn about the Anubis Malware Analysis Tool,” , 2015, URL https://anubis.iseclab.org/, accessed: 2015-06-19.

Kaspersky Lab, “THE DUQU 2.0,” , 2015, URL https://securelist.com/

files/2015/06/The_Mystery_of_Duqu_2_0_a_sophisticated_

cyberespionage_actor_returns.pdf, accessed: 2015-06-19.

Kohavi, R. et al., “A study of cross-validation and bootstrap for accuracy estimation and model selection,” in “Ijcai,” volume 14, pp. 1137–1145, 1995.

Kruegel, C., “Labs Report at RSA: Evasive Malware’s Gone Mainstream,” , 2015, URL http://labs.lastline.com/evasive-malware-gone-mainstream, accessed: 2015-05-27.

Joshua Tommy Juwono

(3)

COMPARISON OF BEHAVIOR ANALYSIS SANDBOXES USING VARIOUS

MACHINE LEARNING ALGORITHMS FOR MALWARE DETECTION Page 61 of 76

Kujawa, A., “Ransomware,” , 2012, URLhttps://blog.malwarebytes.org/

intelligence/2012/12/ransomware/, accessed: 2015-06-01.

Kumar, A. V., Vishnani, K., and Kumar, K. V., “Split personality malware detection and defeating in popular virtual machines,” in “Proceedings of the Fifth International Conference on Security of Information and Networks,” pp. 20–26, ACM, 2012.

Kushner, D., “The Real Story of Stuxnet,” , 2013, URLhttp://spectrum.ieee.

org/telecom/security/the-real-story-of-stuxnet, accessed: 2015- 05-26.

LeDoux, C. and Lakhotia, A., “Malware and Machine Learning,” in “Intelligent Meth- ods for Cyber Warfare,” pp. 1–42, Springer, 2015.

Lenovo, “SUPERFISH VULNERABILITY,” Technical report, Lenovo, 2015, URL http://support.lenovo.com/us/en/product_security/

superfish, accessed: 2015-06-03.

Mcafee Labs, “McAfee Labs Threats Report,” Technical report, Mcafee Labs, 2014, URLwww.mcafee.com/November2014ThreatsReport.

Microsoft, “Ransomware,” , 2014, URL https://www.microsoft.com/

security/portal/mmpc/shared/ransomware.aspx, accessed: 2015-06- 01.

Moser, A., Kruegel, C., and Kirda, E., “Limits of static analysis for malware detection,”

in “Computer security applications conference, 2007. ACSAC 2007. Twenty-third an- nual,” pp. 421–430, IEEE, 2007.

Powers, D. M., “Evaluation: from precision, recall and F-measure to ROC, informed- ness, markedness and correlation,” , 2011.

Qiao, Y., Yang, Y., He, J., Tang, C., and Liu, Z., “CBM: Free, Automatic Malware Anal- ysis Framework Using API Call Sequences,” in “Knowledge Engineering and Manage- ment,” pp. 225–236, Springer, 2014.

Rieck, K., Trinius, P., Willems, C., and Holz, T., “Automatic analysis of malware behav- ior using machine learning,”Journal of Computer Security, volume 19(4) pp. 639–668, 2011.

Joshua Tommy Juwono

(4)

COMPARISON OF BEHAVIOR ANALYSIS SANDBOXES USING VARIOUS

MACHINE LEARNING ALGORITHMS FOR MALWARE DETECTION Page 62 of 76

Svetnik, V., Liaw, A., Tong, C., Culberson, J. C., Sheridan, R. P., and Feuston, B. P., “Random forest: a classification and regression tool for compound classifica- tion and QSAR modeling,” Journal of chemical information and computer sciences, volume 43(6) pp. 1947–1958, 2003.

Tan, P.-N., Steinbach, M., Kumar, V. et al., Introduction to data mining, volume 1, Pearson Education Limited, 2014.

Tian, R., An integrated malware detection and classification system, Ph.D. thesis, Deakin University, 2011.

Vishnani, K., Pais, A. R., and Mohandas, R., “Detecting & Defeating Split Personality Malware,” in “The Fifth International Conference on Emerging Security Information, Systems and Technologies,” , 2011.

Zabidi, M. N. A., Maarof, M. A., and Zainal, A., “Malware analysis with multiple features,” in “Computer Modelling and Simulation (UKSim), 2012 UKSim 14th Inter- national Conference on,” pp. 231–235, IEEE, 2012.

Joshua Tommy Juwono

Referensi

Dokumen terkait

RECOMMENDATIONS If nuclear power in South Africa is pursued, as planned, it would be important to: • Enhance research and develop human capacity in nuclear energy, particularly in

Afrikaans-medium schools have become the sources of manpower for the public service and despite the policy of equal treatment of the official languages a policy entrenched in the South