Abstract
The expansion of internet technology has made convenience. On the one hand various malicious code is produced. The number of malicious codes occurrence has dramatically increasing, and new or variant malicious code circulation very serious, So it is time to require analysis about malicious code. The being so malicious code pattern extract for malicious code properties of anti-virus company. Visualization possible to make one image for thousands upon thousands of malicious code. and It is possible to extract unseen pattern. Therefore this paper of object is various malicious code analysis besides new or variant malicious code type or form deduction using visualization of strong. Thus this paper proposes unseen malicious code pattern extract.
Similar content being viewed by others
References
Ahn Lab. ASEC_Annual_Report. May, 2009–May, 2010.
Bae S-J, Kwon O-C, Moon J-S, Cho J-i (2008) Study on malignant regrouping method using Native API frequency based fuzzy congregation. Inf Prot Soc Pap 18(6):115–127
Choi H, Lee H (2005) PCAV: internet attack visualization on parallel coordinates. Springer, Information and Communications Security
Few S (2006) Multivariate analysis using parallel coordinates. Perceptual Edge, September, 12
Jang Y-J, Cha M-S, Jung J-S, Cho S-H (2008) Trend and future prospect of malignant code. Inf Prot Soc Pap 18(3):1–16
Kasemsri RR, Zhu Y (2005) A survey, taxonomy, and analysis of network security visualization techniques. Citeseer
Keim DA (2002) Information visualization and visual data mining. IEEE Trans Vis Comput Graph 7(1)
Nwokedi, Mathur AP (2007) A survey of malware detection techniques. Citeseer, Purdue University
Seo H-S, Choi J-S, Joo P-w (2009) Engineering window malignant code classification method. Prot Soc Pap 19(2):88–92
Seo H-S, Choi J-S, Joo P-w (2009) Study on window malignant code classification system. Korean Simul Academ Pap 18(1):63–70
Skoudis E, Zeltser L (2004) Malware: fighting malicious code, books.google.com
Ward MO (1994) XmdvTool: integrating multiple methods for visualizing multivariate data, portal.acm.org
Acknowledgements
This work was supported by a grant from Gyeonggi-do Technology Development Project (No A10101110).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, D., Kim, K.J. A study on malicious codes pattern advanced analysis using visualization. Multimed Tools Appl 68, 253–263 (2014). https://doi.org/10.1007/s11042-011-0907-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-011-0907-x