Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls
- Авторы: Ognev R.A.1, Zhukovskii E.V.1, Zegzhda D.P.1
-
Учреждения:
- Peter the Great St. Petersburg Polytechnic University (SPbPU)
- Выпуск: Том 53, № 8 (2019)
- Страницы: 1045-1055
- Раздел: Article
- URL: https://journals.rcsi.science/0146-4116/article/view/176009
- DOI: https://doi.org/10.3103/S0146411619080212
- ID: 176009
Цитировать
Аннотация
The use of clustering algorithms to determine the types of malicious software files based on the analysis of the WinAPI function call sequences is investigated. The use of clustering algorithms such as k-means, EM-algorithm, hierarchical algorithm, and the affinity propagation method is considered. The quality of clustering is evaluated using the silhouette metrics, the Calinski–Harabasz index, and the Davies–Bouldin index.
Об авторах
R. Ognev
Peter the Great St. Petersburg Polytechnic University (SPbPU)
Email: dmitry@ibks.spbstu.ru
Россия, St. Petersburg, 195251
E. Zhukovskii
Peter the Great St. Petersburg Polytechnic University (SPbPU)
Автор, ответственный за переписку.
Email: spbzhuk@gmail.com
Россия, St. Petersburg, 195251
D. Zegzhda
Peter the Great St. Petersburg Polytechnic University (SPbPU)
Автор, ответственный за переписку.
Email: dmitry@ibks.spbstu.ru
Россия, St. Petersburg, 195251
Дополнительные файлы
