Analysis of Malware Behaviour: Using Data Mining Clustering Techniques to Support Forensics Investigation

@article{Edem2014AnalysisOM,
  title={Analysis of Malware Behaviour: Using Data Mining Clustering Techniques to Support Forensics Investigation},
  author={Edem Inang Edem and Chafika Benzaid and Ameer Al-Nemrat and P. A. Watters},
  journal={2014 Fifth Cybercrime and Trustworthy Computing Conference},
  year={2014},
  pages={54-63}
}
  • Edem Inang Edem, Chafika Benzaid, +1 author P. A. Watters
  • Published in
    Fifth Cybercrime and…
    2014
  • Computer Science
  • The proliferation of malware in recent times have accounted for the increase in computer crimes and prompted for a more aggressive research into improved investigative strategies, to keep up with the menace. Recent techniques and tools that have been developed and adopted to keep up in an arms race with malware authors who have resorted to the use of evasive techniques to avoid analysis during investigation is an on-going concern. Exploring dynamic analysis is unarguably, a positive step to… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Citations

    Publications citing this paper.
    SHOWING 1-7 OF 7 CITATIONS

    Clustering the polymorphic malware traces

    VIEW 3 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Malware Incident Handling and Analysis Workflow

    VIEW 1 EXCERPT
    CITES METHODS

    Malicious VBScript detection algorithm based on data-mining techniques

    • Doaa Wael, Ahmed F. Shosha, Samir G. Sayed
    • Computer Science
    • 2017 Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & 2017 Intl Conf on New Paradigms in Electronics & Information Technology (PEIT)
    • 2017
    VIEW 1 EXCERPT
    CITES METHODS

    Using K-means algorithm for the road junction time period analysis

    • Hung-Chi Chu, Chi-Kun Wang
    • Computer Science
    • 2017 IEEE 8th International Conference on Awareness Science and Technology (iCAST)
    • 2017
    VIEW 1 EXCERPT

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 32 REFERENCES

    Wamp server - windows, apache, mysql, php

    • WAMP
    • Available at: http://www.wampserver.com/en/, 2013.
    • 2013
    VIEW 5 EXCERPTS
    HIGHLY INFLUENTIAL

    On partitional clustering of malware

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    Automatic analysis of malware behavior using machine learning

    VIEW 7 EXCERPTS
    HIGHLY INFLUENTIAL

    Measuring similarity of malware behavior

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    Automated Classification and Analysis of Internet Malware

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    Janert, Data Analysis with Open Source Tools, 1st ed

    • P K.
    • 2010
    VIEW 3 EXCERPTS
    HIGHLY INFLUENTIAL

    2013 data breach investigations report

    • Verizon
    • Available at: http://www.verizonenterprise.com/resources/reports/rp data-breachinvestigations-report-2013 en xg.pdf. (Access: 18 July 2013), 2013.
    • 2013
    VIEW 2 EXCERPTS