DocumentCode :
1856025
Title :
Integrating Dynamic Analysis Using Clustering Techniques for local Malware in Indonesia
Author :
Christian, Rocky ; Lim, Charles ; Nugroho, Anto Satriyo ; Kisworo, Marsudi
Author_Institution :
Fac. of Inf. & Commun. Technol., Swiss German Univ., Tangerang, Indonesia
fYear :
2010
fDate :
2-3 Dec. 2010
Firstpage :
167
Lastpage :
169
Abstract :
The understanding and predict threats to the security of information systems become really important in order to protect critical systems. Protection against the threat of computer threats have been adequately considered with anti-virus software which resulted in an increase in world surveys from CSI Survey 2008 for the use of security technologies against malware is that the use of antivirus stand in the first position with 97% usage rate. Malware has several characteristics and behavior that vary according to the programming techniques and objectives of the creator of the virus. Protection so that the system efficacy rely solely on antivirus software alone, not be considered sufficient. local malware have got a lot of attention to be seriously considered. This can be proofed with contribution and sharing information of Indonesia computer security communities and professional, Indonesia CERT, and also antivirus vendor consist of worldwide antivirus vendor and local antivirus vendor . local malware is not different from the other malware in the world that it is a potential threat. This research will focus on local malware analysis using data mining especially with clustering techniques and conducted to serve objective of analyzing local malwares characteristics/behaviors. This research propose Self-Organizing Map (SOM) and Simple K-means as the clustering analysis techniques.
Keywords :
data mining; invasive software; pattern clustering; self-organising feature maps; Indonesia CERT; Indonesia computer security communities; antivirus software; antivirus vendor; clustering techniques; computer threats Protection; data mining; information systems security; local malware analysis; programming techniques; self-organizing map; simple K-means; Algorithm design and analysis; Clustering algorithms; Data mining; Feature extraction; Malware; Self organizing feature maps; Software; benign; clustering; data mining; malware;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advances in Computing, Control and Telecommunication Technologies (ACT), 2010 Second International Conference on
Conference_Location :
Jakarta
Print_ISBN :
978-1-4244-8746-2
Electronic_ISBN :
978-0-7695-4269-0
Type :
conf
DOI :
10.1109/ACT.2010.30
Filename :
5675818
Link To Document :
بازگشت