Malware Detection using Structural and Behavioural Features and Machine Learning

[1]  Russ Housley,et al.  Security flaws in 802.11 data link protocols , 2003, CACM.

[2]  Steve R. White,et al.  Computers and epidemiology , 1993, IEEE Spectrum.

[3]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .

[4]  J. Fleiss Statistical methods for rates and proportions , 1974 .

[5]  J. Ross Quinlan,et al.  Combining Instance-Based and Model-Based Learning , 1993, ICML.

[6]  Johnson M. Hart,et al.  Windows System Programming , 2004 .

[7]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[8]  George Cybenko,et al.  Approximation by superpositions of a sigmoidal function , 1992, Math. Control. Signals Syst..

[9]  Jerome A. Feldman,et al.  On the Synthesis of Finite-State Machines from Samples of Their Behavior , 1972, IEEE Transactions on Computers.

[10]  Kyung-Suk Lhee,et al.  Buffer overflow and format string overflow vulnerabilities , 2003, Softw. Pract. Exp..

[11]  Vipin Kumar,et al.  Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.

[12]  Antonia J. Jones,et al.  Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences , 2007, Comput. Secur..

[13]  Ronald L. Rivest,et al.  Constructing Optimal Binary Decision Trees is NP-Complete , 1976, Inf. Process. Lett..

[14]  Mingtian Zhou,et al.  Some Further Theoretical Results about Computer Viruses , 2004, Comput. J..

[15]  Somesh Jha,et al.  Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.

[16]  J. Ross Quinlan,et al.  Unknown Attribute Values in Induction , 1989, ML.

[17]  Steve R. White,et al.  Anatomy of a Commercial-Grade Immune System , 1999 .

[18]  Joseph M. Newcomer,et al.  Win32 programming , 1997 .

[19]  Wim van Eck,et al.  Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..

[20]  Zhi-hong Zuo,et al.  Infection, imitation and a hierarchy of computer viruses , 2006, Comput. Secur..

[21]  Eugene H. Spafford,et al.  Defending a Computer System Using Autonomous Agents , 1995 .

[22]  R. Boudon,et al.  The Unintended Consequences of Social Action , 1984 .

[23]  Richard R. Linde,et al.  Operating system penetration , 1975, AFIPS '75.

[24]  A. Watkins An immunological approach to intrusion detection , 2000 .

[25]  Mark Russinovich,et al.  Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server(TM) 2003, Windows XP, and Windows 2000 (Pro-Developer) , 2004 .

[26]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[27]  Carl S. Young,et al.  Infection dynamics on the Internet , 2005, Comput. Secur..

[28]  Gerald L. Kovacich,et al.  Information Assurance: Surviving in the Information Environment , 2001 .

[29]  Fred Cohen,et al.  Computational aspects of computer viruses , 1989, Comput. Secur..

[30]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .

[31]  Gerald Tesauro,et al.  Neural networks for computer virus recognition , 1996 .

[32]  John F. Shoch,et al.  The “worm” programs—early experience with a distributed computation , 1982, CACM.

[33]  Danny Bradbury The metamorphosis of malware writers , 2006, Comput. Secur..

[34]  Salvatore J. Stolfo,et al.  Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[35]  J. B. Gunn Use of virus functions to provide a virtual APL interpreter under user control , 1984 .

[36]  Kurt Hornik,et al.  Multilayer feedforward networks are universal approximators , 1989, Neural Networks.

[37]  Eugene H. Spafford,et al.  Active Defense of a Computer System using Autonomous Agents , 1995 .

[38]  Matt Bishop,et al.  An Overview of Computer Viruses in a Research Environment , 1991 .

[39]  Brian W. Kernighan,et al.  The C Programming Language, Second Edition , 1988 .

[40]  Galen C. Hunt,et al.  Detours: binary interception of Win32 functions , 1999 .

[41]  Takuji Nishimura,et al.  Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.