Vis enkel innførsel

dc.contributor.authorShalaginov, Andrii
dc.contributor.authorBanin, Sergii
dc.contributor.authorDehghantanha, Ali
dc.contributor.authorFranke, Katrin
dc.date.accessioned2018-09-06T10:30:35Z
dc.date.available2018-09-06T10:30:35Z
dc.date.created2018-08-24T11:01:59Z
dc.date.issued2018
dc.identifier.isbn978-3-319-73951-9
dc.identifier.urihttp://hdl.handle.net/11250/2561162
dc.description.abstractMalware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections. The fast growth in variety and number of malware species made it very difficult for forensics investigators to provide an on time response. Therefore, Machine Learning (ML) aided malware analysis became a necessity to automate different aspects of static and dynamic malware investigation. We believe that machine learning aided static analysis can be used as a methodological approach in technical Cyber Threats Intelligence (CTI) rather than resource-consuming dynamic malware analysis that has been thoroughly studied before. In this paper, we address this research gap by conducting an in-depth survey of different machine learning methods for classification of static characteristics of 32-bit malicious Portable Executable (PE32) Windows files and develop taxonomy for better understanding of these techniques. Afterwards, we offer a tutorial on how different machine learning techniques can be utilized in extraction and analysis of a variety of static characteristic of PE binaries and evaluate accuracy and practical generalization of these techniques. Finally, the results of experimental study of all the method using common data was given to demonstrate the accuracy and complexity. This paper may serve as a stepping stone for future researchers in cross-disciplinary field of machine learning aided malware forensics.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.relation.ispartofCyber Threat Intelligence
dc.relation.urihttps://arxiv.org/pdf/1808.01201.pdf
dc.titleMachine Learning Aided Static Malware Analysis: A Survey and Tutorialnb_NO
dc.typeChapternb_NO
dc.description.versionsubmittedVersionnb_NO
dc.source.pagenumber7-45nb_NO
dc.identifier.doi10.1007/978-3-319-73951-9_2
dc.identifier.cristin1604251
dc.description.localcodeThis chapter will not be available due to copyright restrictions (c) 2018 by Springernb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextpreprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel