Sumav: A Scheme for Selecting a Keyword from Detection Names using Conditional Probability
With the rapid increase of malware, the detection and recognition of malware are getting hard. In this paper, we propose a scheme for selecting the representative malware keyword from malicious files selected from multiple antivirus engines. Using a token policy and a conditional probability among t...
Saved in:
Published in: | 2020 International Conference on Information and Communication Technology Convergence (ICTC) pp. 1557 - 1559 |
---|---|
Main Authors: | , , , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
21-10-2020
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | With the rapid increase of malware, the detection and recognition of malware are getting hard. In this paper, we propose a scheme for selecting the representative malware keyword from malicious files selected from multiple antivirus engines. Using a token policy and a conditional probability among the nodes, we solved the problem with manual effort in previous studies. Through the experiment using real dataset from VT, we proved that the accuracy of representativeness has improved. |
---|---|
AbstractList | With the rapid increase of malware, the detection and recognition of malware are getting hard. In this paper, we propose a scheme for selecting the representative malware keyword from malicious files selected from multiple antivirus engines. Using a token policy and a conditional probability among the nodes, we solved the problem with manual effort in previous studies. Through the experiment using real dataset from VT, we proved that the accuracy of representativeness has improved. |
Author | Kim, Bora Kim, Suyoung Jung, Wookhyun Kim, Sangwon Tak Kim, Eui Lee, Buyngmoo |
Author_xml | – sequence: 1 givenname: Sangwon surname: Kim fullname: Kim, Sangwon email: bestksw@estsecurity.com organization: ESTsecurity,Seoul,Republic of Korea – sequence: 2 givenname: Bora surname: Kim fullname: Kim, Bora email: bora.k@estsecurity.com organization: ESTsecurity,Seoul,Republic of Korea – sequence: 3 givenname: Suyoung surname: Kim fullname: Kim, Suyoung email: ymt45@estsecurity.com organization: ESTsecurity,Seoul,Republic of Korea – sequence: 4 givenname: Wookhyun surname: Jung fullname: Jung, Wookhyun email: pplan5872@estsecurity.com organization: ESTsecurity,Seoul,Republic of Korea – sequence: 5 givenname: Buyngmoo surname: Lee fullname: Lee, Buyngmoo email: sophia@estsecurity.com organization: ESTsecurity,Seoul,Republic of Korea – sequence: 6 givenname: Eui surname: Tak Kim fullname: Tak Kim, Eui email: am003507@estsecurity.com organization: ESTsecurity,Seoul,Republic of Korea |
BookMark | eNotj8tKw0AYhUfQhdY-gSDzAolzzcy4K_FWLK2QunFT_iR_dCDJyCRV8vYS7OrA-Q4fnCty3oceCbnlLOWcubt1vs-Vs4alggmWOmEdt-6MLJ2x3AjLM6OtuyQfxbGDn3u6okX1hR3SJkRaYIvV6PtPCvQVp98Qa9rE0NEHHGcQerqFDgd6HOZRHvrazy209C2GEkrf-nG6JhcNtAMuT7kg70-P-_wl2eye1_lqk3jB5JiURjENTWYqkzGtDBiBUmvuSlvzTAkDVlQokdeSSYaWo1SglLKV1AIgkwty8-_1iHj4jr6DOB1Oj-UfT6tPxQ |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICTC49870.2020.9289189 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781728167589 1728167582 |
EndPage | 1559 |
ExternalDocumentID | 9289189 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i203t-b7405af67c760547a72e35519b8d16427a82ce3e1d3030e81e34a4448c352aa63 |
IEDL.DBID | RIE |
IngestDate | Wed Jun 26 19:26:29 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i203t-b7405af67c760547a72e35519b8d16427a82ce3e1d3030e81e34a4448c352aa63 |
PageCount | 3 |
ParticipantIDs | ieee_primary_9289189 |
PublicationCentury | 2000 |
PublicationDate | 2020-Oct.-21 |
PublicationDateYYYYMMDD | 2020-10-21 |
PublicationDate_xml | – month: 10 year: 2020 text: 2020-Oct.-21 day: 21 |
PublicationDecade | 2020 |
PublicationTitle | 2020 International Conference on Information and Communication Technology Convergence (ICTC) |
PublicationTitleAbbrev | ICTC |
PublicationYear | 2020 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.7868097 |
Snippet | With the rapid increase of malware, the detection and recognition of malware are getting hard. In this paper, we propose a scheme for selecting the... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1557 |
SubjectTerms | antivirus detection keyword summarize |
Title | Sumav: A Scheme for Selecting a Keyword from Detection Names using Conditional Probability |
URI | https://ieeexplore.ieee.org/document/9289189 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA22J08qrfhNDh7dNptsm8Sb9IOKUIStIF7KZHdWeuhWdFfpv3eyu1QEL95CCAmZQOa9ZN4MY9ciSmBIRDmwKlNBlNE9CIAyyEyauYTwsqpUrrNYz5_NeOLT5NzstDCIWAWfYc83q7_8dJOU_qmsb4kdhMa2WEtbU2u1GtFvKGz_frQYRUShBbE-KXrN4F9VUyqnMT3433KHrPujvuOPO79yxPYw77CXuFzD5y2_4zGZeY2cwCaPqyI2NIgDf8DtFxFJ7vUifIxFFWKV87mPguU-uv2V0_zpqn778wu4OkX3tsueppPFaBY0dRGClRSqCJwmlAXZUCeayEikQUsk2BBaZ1JiP1KDkQkqDFPyTwJNiCqCiHhYQmgLYKiOWTvf5HjCOAwUgM3sAF0aOTDWqUFGoEKEiZO0_1PW8XZZvtWpL5aNSc7-7j5n-970_mqX4QVrF-8lXrLWR1peVYf1DR1xlo8 |
link.rule.ids | 310,311,782,786,791,792,798,27936,54770 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA22HvSk0orf5uDRbbNJttl4k37Q0lqErSBeSrI7Kz10K9pV-u-d7C4VwYu3EEJCJpB5L5k3Q8gNk7HpIFH2tEiFJ1O8B40B7qVhktoY8bIoVK7DSE2fw17fpcm53WphAKAIPoOWaxZ_-ckqzt1TWVsjO_BDXSO7gVSKlWqtSvbrM90edWddiSSaIe_jrFUN_1U3pXAbg4P_LXhImj_6O_q49SxHZAeyBnmJ8qX5vKP3NEJDL4Ei3KRRUcYGB1FDx7D5QipJnWKE9mBdBFlldOriYKmLb3-lOH-yKF__3AK2TNK9aZKnQX_WHXpVZQRvwZlYe1YhzjJpR8UK6YhURnFA4OBrGybIf7gyIY9BgJ-gh2IQ-iCkkcjEYsRbxnTEMalnqwxOCDWBMEanOgCbSGtCbUWQIqxgfmw57v-UNJxd5m9l8ot5ZZKzv7uvyd5w9jCZT0bT8TnZd8fgLnruX5D6-j2HS1L7SPKr4uC-ATDXmdo |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+International+Conference+on+Information+and+Communication+Technology+Convergence+%28ICTC%29&rft.atitle=Sumav%3A+A+Scheme+for+Selecting+a+Keyword+from+Detection+Names+using+Conditional+Probability&rft.au=Kim%2C+Sangwon&rft.au=Kim%2C+Bora&rft.au=Kim%2C+Suyoung&rft.au=Jung%2C+Wookhyun&rft.date=2020-10-21&rft.pub=IEEE&rft.spage=1557&rft.epage=1559&rft_id=info:doi/10.1109%2FICTC49870.2020.9289189&rft.externalDocID=9289189 |