Show simple item record

dc.contributor.authorGoranin, Nikolaj
dc.contributor.authorČeponis, Dainius
dc.date.accessioned2023-09-18T17:42:36Z
dc.date.available2023-09-18T17:42:36Z
dc.date.issued2018
dc.identifier.issn2535-0668
dc.identifier.urihttps://etalpykla.vilniustech.lt/handle/123456789/125296
dc.description.abstractNowadays, information systems security is a crucial aspect – vulnerable system endpoint can lead to severe data loss. Intrusion detection systems (IDS) are used to detect such unfortunate events. Implementation place defines the type of IDS: network-based (NIDS) for network traffic monitoring or host-based (HIDS), to detect malicious actions on the host level. IDS can be effective only if generated alerts are correctly evaluated and classified, what is typically done by a trained staff, but requires a lot of time and human resources. While a lot research is done with NIDS alerts evaluation, HIDS research is lacking behind. HIDS reported operating system calls could be used to define the importance of alarms and steer analysts to the most critical issues. In this article we demonstrate the applicability of our created Attack-Caused Windows System Calls Traces Dataset (AWSCTD), which is currently the most comprehensive dataset of system calls generated by almost all modern malware types, for training different classification methods on malware type recognition and later alert prioritization. The effectiveness of different classification methods is evaluated, and results are presented. Currently achieved results allow to decrease the load on analytical staff, dealing with malware classification and related alert prioritization by 92.4%, which makes this approach applicable for practical use.eng
dc.formatPDF
dc.format.extentp. 186-189
dc.format.mediumtekstas / txt
dc.language.isoeng
dc.source.urihttp://stumejournals.com/confsec.htm
dc.titleInvestigation of AWSCTD dataset applicability for malware type classification
dc.typeStraipsnis kitame recenzuotame leidinyje / Article in other peer-reviewed source
dcterms.references21
dc.type.pubtypeS4 - Straipsnis kitame recenzuotame leidinyje / Article in other peer-reviewed publication
dc.contributor.institutionVilniaus Gedimino technikos universitetas
dc.contributor.facultyFundamentinių mokslų fakultetas / Faculty of Fundamental Sciences
dc.contributor.departmentTaikomosios informatikos institutas / Institute of Applied Computer Science
dc.subject.researchfieldT 007 - Informatikos inžinerija / Informatics engineering
dc.subject.vgtuprioritizedfieldsIK0101 - Informacijos ir informacinių technologijų sauga / Information and Information Technologies Security
dc.subject.ltspecializationsL106 - Transportas, logistika ir informacinės ir ryšių technologijos (IRT) / Transport, logistic and information and communication technologies
dc.subject.enhids
dc.subject.enalert prioritisation
dc.subject.enmachine learning
dc.subject.enwindows
dc.subject.ensystem calls
dcterms.sourcetitleInternational Scientific Journal Security & Future
dc.description.issueiss. 4
dc.description.volumevol. 2
dc.publisher.nameScientific Technical Union of Mechanical Engineering "Industry-4.0"
dc.publisher.citySofia
dc.identifier.elaba33148261


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record