Sumav: A Scheme for Selecting a Keyword from Detection Names using Conditional Probability

With the rapid increase of malware, the detection and recognition of malware are getting hard. In this paper, we propose a scheme for selecting the representative malware keyword from malicious files selected from multiple antivirus engines. Using a token policy and a conditional probability among t...

Full description

Saved in:
Bibliographic Details
Published in:2020 International Conference on Information and Communication Technology Convergence (ICTC) pp. 1557 - 1559
Main Authors: Kim, Sangwon, Kim, Bora, Kim, Suyoung, Jung, Wookhyun, Lee, Buyngmoo, Tak Kim, Eui
Format: Conference Proceeding
Language:English
Published: IEEE 21-10-2020
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract With the rapid increase of malware, the detection and recognition of malware are getting hard. In this paper, we propose a scheme for selecting the representative malware keyword from malicious files selected from multiple antivirus engines. Using a token policy and a conditional probability among the nodes, we solved the problem with manual effort in previous studies. Through the experiment using real dataset from VT, we proved that the accuracy of representativeness has improved.
AbstractList With the rapid increase of malware, the detection and recognition of malware are getting hard. In this paper, we propose a scheme for selecting the representative malware keyword from malicious files selected from multiple antivirus engines. Using a token policy and a conditional probability among the nodes, we solved the problem with manual effort in previous studies. Through the experiment using real dataset from VT, we proved that the accuracy of representativeness has improved.
Author Kim, Bora
Kim, Suyoung
Jung, Wookhyun
Kim, Sangwon
Tak Kim, Eui
Lee, Buyngmoo
Author_xml – sequence: 1
  givenname: Sangwon
  surname: Kim
  fullname: Kim, Sangwon
  email: bestksw@estsecurity.com
  organization: ESTsecurity,Seoul,Republic of Korea
– sequence: 2
  givenname: Bora
  surname: Kim
  fullname: Kim, Bora
  email: bora.k@estsecurity.com
  organization: ESTsecurity,Seoul,Republic of Korea
– sequence: 3
  givenname: Suyoung
  surname: Kim
  fullname: Kim, Suyoung
  email: ymt45@estsecurity.com
  organization: ESTsecurity,Seoul,Republic of Korea
– sequence: 4
  givenname: Wookhyun
  surname: Jung
  fullname: Jung, Wookhyun
  email: pplan5872@estsecurity.com
  organization: ESTsecurity,Seoul,Republic of Korea
– sequence: 5
  givenname: Buyngmoo
  surname: Lee
  fullname: Lee, Buyngmoo
  email: sophia@estsecurity.com
  organization: ESTsecurity,Seoul,Republic of Korea
– sequence: 6
  givenname: Eui
  surname: Tak Kim
  fullname: Tak Kim, Eui
  email: am003507@estsecurity.com
  organization: ESTsecurity,Seoul,Republic of Korea
BookMark eNotj8tKw0AYhUfQhdY-gSDzAolzzcy4K_FWLK2QunFT_iR_dCDJyCRV8vYS7OrA-Q4fnCty3oceCbnlLOWcubt1vs-Vs4alggmWOmEdt-6MLJ2x3AjLM6OtuyQfxbGDn3u6okX1hR3SJkRaYIvV6PtPCvQVp98Qa9rE0NEHHGcQerqFDgd6HOZRHvrazy209C2GEkrf-nG6JhcNtAMuT7kg70-P-_wl2eye1_lqk3jB5JiURjENTWYqkzGtDBiBUmvuSlvzTAkDVlQokdeSSYaWo1SglLKV1AIgkwty8-_1iHj4jr6DOB1Oj-UfT6tPxQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICTC49870.2020.9289189
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781728167589
1728167582
EndPage 1559
ExternalDocumentID 9289189
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i203t-b7405af67c760547a72e35519b8d16427a82ce3e1d3030e81e34a4448c352aa63
IEDL.DBID RIE
IngestDate Wed Jun 26 19:26:29 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i203t-b7405af67c760547a72e35519b8d16427a82ce3e1d3030e81e34a4448c352aa63
PageCount 3
ParticipantIDs ieee_primary_9289189
PublicationCentury 2000
PublicationDate 2020-Oct.-21
PublicationDateYYYYMMDD 2020-10-21
PublicationDate_xml – month: 10
  year: 2020
  text: 2020-Oct.-21
  day: 21
PublicationDecade 2020
PublicationTitle 2020 International Conference on Information and Communication Technology Convergence (ICTC)
PublicationTitleAbbrev ICTC
PublicationYear 2020
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7868097
Snippet With the rapid increase of malware, the detection and recognition of malware are getting hard. In this paper, we propose a scheme for selecting the...
SourceID ieee
SourceType Publisher
StartPage 1557
SubjectTerms antivirus
detection
keyword
summarize
Title Sumav: A Scheme for Selecting a Keyword from Detection Names using Conditional Probability
URI https://ieeexplore.ieee.org/document/9289189
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA22J08qrfhNDh7dNptsm8Sb9IOKUIStIF7KZHdWeuhWdFfpv3eyu1QEL95CCAmZQOa9ZN4MY9ciSmBIRDmwKlNBlNE9CIAyyEyauYTwsqpUrrNYz5_NeOLT5NzstDCIWAWfYc83q7_8dJOU_qmsb4kdhMa2WEtbU2u1GtFvKGz_frQYRUShBbE-KXrN4F9VUyqnMT3433KHrPujvuOPO79yxPYw77CXuFzD5y2_4zGZeY2cwCaPqyI2NIgDf8DtFxFJ7vUifIxFFWKV87mPguU-uv2V0_zpqn778wu4OkX3tsueppPFaBY0dRGClRSqCJwmlAXZUCeayEikQUsk2BBaZ1JiP1KDkQkqDFPyTwJNiCqCiHhYQmgLYKiOWTvf5HjCOAwUgM3sAF0aOTDWqUFGoEKEiZO0_1PW8XZZvtWpL5aNSc7-7j5n-970_mqX4QVrF-8lXrLWR1peVYf1DR1xlo8
link.rule.ids 310,311,782,786,791,792,798,27936,54770
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA22HvSk0orf5uDRbbNJttl4k37Q0lqErSBeSrI7Kz10K9pV-u-d7C4VwYu3EEJCJpB5L5k3Q8gNk7HpIFH2tEiFJ1O8B40B7qVhktoY8bIoVK7DSE2fw17fpcm53WphAKAIPoOWaxZ_-ckqzt1TWVsjO_BDXSO7gVSKlWqtSvbrM90edWddiSSaIe_jrFUN_1U3pXAbg4P_LXhImj_6O_q49SxHZAeyBnmJ8qX5vKP3NEJDL4Ei3KRRUcYGB1FDx7D5QipJnWKE9mBdBFlldOriYKmLb3-lOH-yKF__3AK2TNK9aZKnQX_WHXpVZQRvwZlYe1YhzjJpR8UK6YhURnFA4OBrGybIf7gyIY9BgJ-gh2IQ-iCkkcjEYsRbxnTEMalnqwxOCDWBMEanOgCbSGtCbUWQIqxgfmw57v-UNJxd5m9l8ot5ZZKzv7uvyd5w9jCZT0bT8TnZd8fgLnruX5D6-j2HS1L7SPKr4uC-ATDXmdo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+International+Conference+on+Information+and+Communication+Technology+Convergence+%28ICTC%29&rft.atitle=Sumav%3A+A+Scheme+for+Selecting+a+Keyword+from+Detection+Names+using+Conditional+Probability&rft.au=Kim%2C+Sangwon&rft.au=Kim%2C+Bora&rft.au=Kim%2C+Suyoung&rft.au=Jung%2C+Wookhyun&rft.date=2020-10-21&rft.pub=IEEE&rft.spage=1557&rft.epage=1559&rft_id=info:doi/10.1109%2FICTC49870.2020.9289189&rft.externalDocID=9289189