[1] |
EGELE M , SCHOLTE T , KIRDA E ,et al. A survey on automated dynamic malware-analysis techniques and tools[J]. ACM Computing Surveys (CSUR), 2012,44(2): 1-42.
|
[2] |
KEPHART J O , ARNOLD W C . Automatic extraction of computer virus signatures[A]. Proceedings of the 4th Virus Bulletin International Conference[C]. 1994. 178-184.
|
[3] |
SATHYANARAYAN V S , KOHLI P , BRUHADESHWAR B . Signature generation and detection of malware families[A]. Information Security and Privacy[C]. Springer Berlin Heidelberg, 2008. 336-349.
|
[4] |
SATISH S , PEREIRA S . Behavioral Signature Generation Using Clustering:WIPO Patent 2011137083[P]. 2011.
|
[5] |
KOLBITSCH C , COMPARETTI P M , KRUEGEL C ,et al. Effective and efficient malware detection at the end host[A]. Proceedings of the 18th Conference on USENIX Security Symposium USENIX Association[C]. 2009. 351-366.
|
[6] |
RAMACHANDRAN A , FEAMSTER N . Understanding the network-level behavior of spammers[J]. ACM Sigcomm Computer Communication Review, 2006,36(4): 291-302.
|
[7] |
INOUE D , YOSHIOKA K , ETO M ,et al. Malware behavior analysis in isolated miniature network for revealing malware's network activity[A]. IEEE International Conference on Communications[C]. 2008. 1715-1721.
|
[8] |
MORALES J A,AL-BATAINEH A , AL-BATAINEH A , XU S ,et al. Analyzing and exploiting network behaviors of malware[A]. Security and Privacy in Communication Networks[C]. Springer Berlin Heidelberg, 2010. 20-34.
|
[9] |
PERDISCI R , LEE W , FEAMSTER N . Behavioral clustering of HTTP-based malware and signature generation using malicious network traces[A]. Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation USENIX Association[C]. 2010. 26-26.
|
[10] |
RIECK K , HOLZ T , WILLEMS C ,et al. Learning and classification of malware behavior[A]. Detection of Intrusions and Malware,and Vulnerability Assessment[C]. Springer Berlin Heidelberg, 2008. 108-125.
|
[11] |
BAILEY M , OBERHEIDE J , ANDERSEN J ,et al. Automated classification and analysis of internet malware[A]. Recent Advances in Intrusion Detection[C]. Springer Berlin Heidelberg, 2007. 178-197.
|
[12] |
RIECK K , HOLZ T , WILLEMS C ,et al. Learning and classification of malware behavior[A]. Detection of Intrusions and Malware,and Vulnerability Assessment[C]. Springer Berlin Heidelberg, 2008. 108-125.
|
[13] |
SATHYANARAYAN V S , KOHLI P , BRUHADESHWAR B . Signature generation and detection of malware families[A]. Information Security and Privacy[C]. Springer Berlin Heidelberg, 2008. 336-349.
|
[14] |
BRANCO R R , SHAMIR U . Architecture for automation of malware analysis[A]. The 5th International Conference on Malicious and Unwanted Software (MALWARE)[C]. 2010. 106-112.
|
[15] |
YE Y , LI T , CHEN Y ,et al. Automatic malware categorization using cluster ensemble[A]. Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining[C]. ACM, 2010. 95-104.
|
[16] |
CESARE S , XIANG Y , ZHOU W . Malwise——an effective and efficient classification system for packed and polymorphic malware[J]. IEEE Trans on Computer, 2013,62(6): 1193-1206.
|
[17] |
MASUD M M , AL-KHATEEB T M , HAMLEN K W ,et al. Cloud-based malware detection for evolving data streams[J]. ACM Transactions on Management Information Systems (TMIS), 2011,2(3): 1-27.
|
[18] |
PAULEVE L , JEGOU H , AMSALEG L . Locality sensitive hashing:a comparison of hash function types and querying mechanisms[J]. Pattern Recognition Letters, 2010,31(11): 1348-1358.
|
[19] |
KOGA H , ISHIBASHI T , WATANABE T . Fast agglomerative hierarchical clustering algorithm using locality-sensitive hashing[J]. Knowledge and Information Systems, 2007,12(1): 25-53.
|
[20] |
BAYER U , COMPARETTI P M , HLAUSCHEK C ,et al. Scalable,behavior-based malware clustering[A]. Network and Distributed System Security Symposium (NDSS)[C]. 2009. 8-11.
|
[21] |
INDYK P , MOTWANI R . Approximate nearest neighbors:towards removing the curse of dimensionality[A]. Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing[C]. 1998. 604-613.
|
[22] |
MIN K , YANG L , WRIGHT J ,et al. Compact projection:simple and efficient near neighbor search with practical memory requirements[A]. IEEE Conference on Computer Vision and Pattern Recognition (CVPR)[C]. 2010. 3477-3484.
|