Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls
- 作者: Ognev R.A.1, Zhukovskii E.V.1, Zegzhda D.P.1
-
隶属关系:
- Peter the Great St. Petersburg Polytechnic University (SPbPU)
- 期: 卷 53, 编号 8 (2019)
- 页面: 1045-1055
- 栏目: Article
- URL: https://journals.rcsi.science/0146-4116/article/view/176009
- DOI: https://doi.org/10.3103/S0146411619080212
- ID: 176009
如何引用文章
详细
The use of clustering algorithms to determine the types of malicious software files based on the analysis of the WinAPI function call sequences is investigated. The use of clustering algorithms such as k-means, EM-algorithm, hierarchical algorithm, and the affinity propagation method is considered. The quality of clustering is evaluated using the silhouette metrics, the Calinski–Harabasz index, and the Davies–Bouldin index.
作者简介
R. Ognev
Peter the Great St. Petersburg Polytechnic University (SPbPU)
Email: dmitry@ibks.spbstu.ru
俄罗斯联邦, St. Petersburg, 195251
E. Zhukovskii
Peter the Great St. Petersburg Polytechnic University (SPbPU)
编辑信件的主要联系方式.
Email: spbzhuk@gmail.com
俄罗斯联邦, St. Petersburg, 195251
D. Zegzhda
Peter the Great St. Petersburg Polytechnic University (SPbPU)
编辑信件的主要联系方式.
Email: dmitry@ibks.spbstu.ru
俄罗斯联邦, St. Petersburg, 195251
补充文件
