• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > ICFICE > ICFICE 2019

ICFICE 2019

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) Change of malicious code API call pattern extraction using RNN and LSTM
¿µ¹®Á¦¸ñ(English Title) Change of malicious code API call pattern extraction using RNN and LSTM
ÀúÀÚ(Author) Young-Bok Cho   Ki-Ju Kim   Jeong-Ah Ku   Sung-Hee Woo  
¿ø¹®¼ö·Ïó(Citation) VOL 11 NO. 01 PP. 0277 ~ 0280 (2019. 06)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
Existing malicious code and detection technologies analyze known malicious code with much time and effort, update it afterwards, detect malicious codes and prevent malicious codes from exploiting new and variant malicious codes. These malicious codes are rapidly changing into various variants to avoid detection of the vaccine. Among the dynamic analysis, methods used to more effectively detect and classify these strains of malware, malicious code family classifies a typical API call pattern by applying CNN. which it is used for natural language processing.
Å°¿öµå(Keyword) NN   Recurrent neural networks   API Call Patten   Malware   Malware API   Machine Learning   Deep Learning   LSTM  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå