Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces.
Roberto PerdisciWenke LeeNick FeamsterPublished in: NSDI (2010)
Keyphrases
- network model
- malicious code
- network traffic
- clustering algorithm
- clustering method
- computer networks
- wireless sensor networks
- network structure
- open source
- complex networks
- website
- peer to peer
- neural network
- cluster analysis
- unsupervised learning
- spectral clustering
- fuzzy clustering
- reverse engineering
- k means
- data flow
- control flow
- network topologies
- detecting malicious
- detect malicious