Abstract

Exfiltration of sensitive data by malicious software or malware is a serious cyber threat around the world that has catastrophic effect on businesses, research organizations, national intelligence, as well as individuals. Thousands of cyber criminals attempt every day to attack computer systems by employing malicious software with an intention to breach crucial data, damage or manipulate data, or to make illegal financial transfers. Protection of this data is therefore, a critical concern in the research community. This manuscript aims to propose a comprehensive framework to classify and detect malicious software to protect sensitive data against malicious threats using data mining and machine learning classification techniques. In this work, we employ a robust and efficient approach for malware classification and detection by analyzing both signature-based and anomaly-based features. Experimental results confirm the superiority of the proposed approach over other similar methods.
Original languageEnglish
Title of host publicationInternational Conference on Applications and Techniques in Cyber Security and Intelligence - Applications and Techniques in Cyber Security and Intelligence
EditorsJemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam
PublisherSpringer-Verlag London Ltd.
Pages266-274
Number of pages9
Volume580
ISBN (Electronic)9783319670713
ISBN (Print)9783319670706
DOIs
Publication statusPublished - 01 Jan 2018
EventInternational Conference on Applications and Techniques in Cyber Security and Intelligence: ATCSI 2017 - Zhejiang Business Technology Institute, Ningbo, China
Duration: 16 Jun 201718 Jun 2017
http://aibd.us/ (Conference website)
https://www.springer.com/us/book/9783319670706 (Conference proceedings)

Publication series

NameAdvances in Intelligent Systems and Computing
Volume580
ISSN (Print)2194-5357

Conference

ConferenceInternational Conference on Applications and Techniques in Cyber Security and Intelligence
CountryChina
CityNingbo
Period16/06/1718/06/17
OtherThe 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI), building on the previous successes in Guangzhou, China (2016), Dallas, USA (2015), Beijing, China (2014), and Sydney, Australia (2013), is proud to be in the 5th consecutive conference year. Previously, the event is known as the International Workshop on Applications and Techniques in Cyber Security (ATCS 2016), held in conjunction with the International Conference on Security and Privacy in Communication Networks (SecureComm).

The 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence focuses on all aspects on techniques and applications in cyber and electronics security and intelligence research. The purpose of ATCI 2017 is to provide a forum for presentation and discussion of innovative ideas, cutting edge research results, and novel techniques, methods and applications on all aspects of cyber and electronics security and intelligence.
Internet address

Fingerprint Dive into the research topics of 'Malware analysis and detection using data mining and machine learning classification'. Together they form a unique fingerprint.

Cite this