Skip to main content
Log in

A study on malicious codes pattern advanced analysis using visualization

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The expansion of internet technology has made convenience. On the one hand various malicious code is produced. The number of malicious codes occurrence has dramatically increasing, and new or variant malicious code circulation very serious, So it is time to require analysis about malicious code. The being so malicious code pattern extract for malicious code properties of anti-virus company. Visualization possible to make one image for thousands upon thousands of malicious code. and It is possible to extract unseen pattern. Therefore this paper of object is various malicious code analysis besides new or variant malicious code type or form deduction using visualization of strong. Thus this paper proposes unseen malicious code pattern extract.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ahn Lab. ASEC_Annual_Report. May, 2009–May, 2010.

  2. Bae S-J, Kwon O-C, Moon J-S, Cho J-i (2008) Study on malignant regrouping method using Native API frequency based fuzzy congregation. Inf Prot Soc Pap 18(6):115–127

    Google Scholar 

  3. Choi H, Lee H (2005) PCAV: internet attack visualization on parallel coordinates. Springer, Information and Communications Security

  4. Few S (2006) Multivariate analysis using parallel coordinates. Perceptual Edge, September, 12

  5. http://en.wikipedia.org/wiki/Cluster_analysis

  6. Jang Y-J, Cha M-S, Jung J-S, Cho S-H (2008) Trend and future prospect of malignant code. Inf Prot Soc Pap 18(3):1–16

    Google Scholar 

  7. Kasemsri RR, Zhu Y (2005) A survey, taxonomy, and analysis of network security visualization techniques. Citeseer

  8. Keim DA (2002) Information visualization and visual data mining. IEEE Trans Vis Comput Graph 7(1)

  9. Nwokedi, Mathur AP (2007) A survey of malware detection techniques. Citeseer, Purdue University

  10. Seo H-S, Choi J-S, Joo P-w (2009) Engineering window malignant code classification method. Prot Soc Pap 19(2):88–92

    Google Scholar 

  11. Seo H-S, Choi J-S, Joo P-w (2009) Study on window malignant code classification system. Korean Simul Academ Pap 18(1):63–70

    Google Scholar 

  12. Skoudis E, Zeltser L (2004) Malware: fighting malicious code, books.google.com

  13. Ward MO (1994) XmdvTool: integrating multiple methods for visualizing multivariate data, portal.acm.org

Download references

Acknowledgements

This work was supported by a grant from Gyeonggi-do Technology Development Project (No A10101110).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to DongHwi Lee.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, D., Kim, K.J. A study on malicious codes pattern advanced analysis using visualization. Multimed Tools Appl 68, 253–263 (2014). https://doi.org/10.1007/s11042-011-0907-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-011-0907-x

Keywords

Navigation