Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Clustering algorithms have become a popular tool in computer security to analyze the behavior of malware variants, identify novel malware families, and generate signatures for antivirus systems.
Nov 25, 2018
Poisoning behavioral malware clustering. Authors: Battista Biggio.
Nov 25, 2018 · We emu- late an attacker who adds specially-crafted poisoning actions to the original behavior of malware samples, thus leaving in- tact their ...
People also ask
Dec 4, 2014 · Conference PaperPDF Available. Poisoning Behavioral Malware Clustering ... poisoning attacks and behavioral malware clustering. 8. ACKNO ...
Poisoning Behavioral Malware Clustering ... Clustering algorithms have become a popular tool in computer security to analyze the behavior of malware variants, ...
Poisoning Complete-Linkage Hierarchical Clustering. Conference paper. pp 42 ... behavioral clustering of http-based malware. Computer Networks 57(2), 487 ...
Improved Analysis of Complete-Linkage Clustering · Poisoning behavioral malware clustering · Novel poisoning attacks for clustering methods via robust feature ...
[22] Battista Biggio, et al. “Poisoning Behavioral Malware. Clustering.” Proceedings of the 2014 Workshop on. Artificial Intelligence and Security.
... behavioral malware clustering, and demonstrates that this tool is vulnerable to poisoning attacks, and that it can be significantly compromised even if the ...
Anti-virus software based on unsupervised hierarchical clustering (HC) of malware samples has been shown to be vulnerable to poisoning attacks.