By Topic

A Study on Analysis of Malicious Codes Similarity Using N-Gram and Vector Space Model

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
DongHwi Lee ; Dept. of Ind. Security, Kyonggi Univ., Suwon, South Korea ; Won Hyung Park ; Kim, K.J.

The development of Information and Communication gives a lot of convenience in our lives, but on the other hand, the new cyber threat like viruses, computer intrusions and so on also increases. Especially, malicious codes such as viruses over the internet are distributed in large quantities. Several studies using reverse engineering or virtual machine have been carried out to analyze malicious codes, but studies on the analysis of the implications or the similarities between malicious codes have not been carried out in variety. Therefore, we suggest the analysis of similarity using N-Gram and Vector Space Model in this paper. The results shows that we can distinguish malicious codes from others using this method.

Published in:

Information Science and Applications (ICISA), 2011 International Conference on

Date of Conference:

26-29 April 2011