Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

The use of clustering algorithms to determine the types of malicious software files based on the analysis of the WinAPI function call sequences is investigated. The use of clustering algorithms such as k-means, EM-algorithm, hierarchical algorithm, and the affinity propagation method is considered. The quality of clustering is evaluated using the silhouette metrics, the Calinski–Harabasz index, and the Davies–Bouldin index.

About the authors

R. A. Ognev

Peter the Great St. Petersburg Polytechnic University (SPbPU)

Email: dmitry@ibks.spbstu.ru
Russian Federation, St. Petersburg, 195251

E. V. Zhukovskii

Peter the Great St. Petersburg Polytechnic University (SPbPU)

Author for correspondence.
Email: spbzhuk@gmail.com
Russian Federation, St. Petersburg, 195251

D. P. Zegzhda

Peter the Great St. Petersburg Polytechnic University (SPbPU)

Author for correspondence.
Email: dmitry@ibks.spbstu.ru
Russian Federation, St. Petersburg, 195251


Copyright (c) 2019 Allerton Press, Inc.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies