期刊文献+

数据挖掘在恶意程序检测中的应用 被引量:1

The Application of the Data Mining to the Malware Detection
下载PDF
导出
摘要 对基于数据挖掘的恶意程序检测技术进行了研究,分析现有安全软件对抗恶意程序的缺陷,并针对这些缺陷提出了新型特征筛选方法和在新型特征的基础上提取恶意程序检测规则的解决方案。 Based on data mining to the malware detection technology research,The defects of security software in against malware are ana lyzed.New feature selection method and extraction rules on basis of the new features are proposed.
作者 张敬 姚书科
出处 《电脑知识与技术(过刊)》 2011年第12X期9048-9049,共2页 Computer Knowledge and Technology
关键词 恶意程序 数据挖掘 检测方法 malware data mining Detection method
  • 相关文献

参考文献3

二级参考文献19

  • 1慈庆玉.计算机变形病毒技术探讨[J].中国数据通信,2005,7(1):37-40. 被引量:7
  • 2Jau-Hwang,Wang Peter S Deng,Yi-Shen Fan,et al.Virus Detection Using Data Mining Techniques[C] //IEEE Computer Society.Proc of IEEE Int Conf on Data Mining.Los Alamitos:IEEE Computer Society Press,2003:362-369.
  • 3Matthew G Schultz,Eleazar Eskin,Erez Zadok.Data Mining Methods for Detection of New Malicious Executables[C]//IEEF Computer Society.Proc of IEEE Symposium on Security and Privacy.Oakland:IEEE Computer Society Press,2001:1-12.
  • 4Sung A H,Xu J,Chavez P,et al.Analyzer of Vicious Executables (SAVE)[C] //IEEE Computer Society.Proc of the 20th Annual Computer Security Applications Conference (ACSAC'04).Los Alamitos:IEEE Computer Society Press,2004:326-334.
  • 5Xu J Y,Sung A H,Chavez P,et al.Polymorphic Malicious Executable Scanner by API Sequence Analysis[C] //IEEE Computer Society.Proc of the Fourth Int.Conf.on Hybrid Intelligent Systems (HIS'04).Los Alamitos:IEEE Computer Society Press,2004:378-383.
  • 6Shen Y D,Yang Q,Zhang Z.Objective-Oriented Utility-Based Association Mining[C] //IEEE Computer Society.Proc of IEEE Int.Conf.on Data Mining.Los Alamitos:IEEE Computer Society Press,2002:426-433.
  • 7Han Jiawei,Micheline Kamber.Data Mining Concept and Techniques[M].北京:高等教育出版社,2003:21-26,225-271.
  • 8Shen Y D,Yang Q,Zhang Z.Mining high utility itemsets[C] //IEEE Computer Society.Proc of IEEE Int.Conf.on Data Mining.Florida:IEEE Computer Society Press,2003:19-26.
  • 9Spinellis D.Reliable Identification of Bounded-Length Viruses Is NP-Complete[J].IEEE Trans on Information Theory,2003,49(1):280-284.
  • 10Tesauro G J,Kephart J O,Sorkin G B.Neural Networks for Computer Virus Recognition[J].IEEE Expert,1996,11(4):5-6.

共引文献4

同被引文献10

引证文献1

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部