Please use this identifier to cite or link to this item:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/53136Full metadata record
| ???org.dspace.app.webui.jsptag.ItemTag.dcfield??? | Value | Language |
|---|---|---|
| dc.contributor.advisor | 廖世偉(Shih-Wei Liao) | |
| dc.contributor.author | Yi-Ting Wei | en |
| dc.contributor.author | 魏翊庭 | zh_TW |
| dc.date.accessioned | 2021-06-15T16:46:32Z | - |
| dc.date.available | 2020-08-28 | |
| dc.date.copyright | 2015-08-28 | |
| dc.date.issued | 2015 | |
| dc.date.submitted | 2015-08-10 | |
| dc.identifier.citation | [1] Konrad Rieck, Philipp Trinius, Carsten Willems, and Thorsten Holz. Automatic analysis of malware behavior using machine learning. Journal of Computer Security, 19(4):639–668, 2011. [2] Gil Tahan, Lior Rokach, and Yuval Shahar. Mal-id: Automatic malware detection using common segment analysis and meta-features. Journal of Machine Learning Research, 13:949–979, 2012. [3] Yanfang Ye, Dingding Wang, Tao Li, and Dongyi Ye. IMDS: intelligent malware detection system. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12-15, 2007, pages 1043–1047, 2007. [4] Duen Horng Chau, Carey Nachenberg, Jeffrey Wilhelm, Adam Wright, and Christos Faloutsos. Polonium: Tera-scale graph mining for malware detection. In ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2010. [5] Jyun-Yu Jiang, Chun-Liang Li, Chun-Pai Yang, and Chung-Tsai Su. POSTER: scanning-free personalized malware warning system by learning implicit feedback from detection logs. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pages 1436–1438, 2014. [6] Yunhong Zhou, Dennis M. Wilkinson, Robert Schreiber, and Rong Pan. Large-scale parallel collaborative filtering for the netflix prize. In Algorithmic Aspects in In-formation and Management, 4th International Conference, AAIM 2008, Shanghai, China, June 23-25, 2008. Proceedings, pages 337–348, 2008. [7] Hsiang-Fu Yu, Cho-Jui Hsieh, Si Si, and Inderjit S. Dhillon. Scalable coordinate descent approaches to parallel matrix factorization for recommender systems. In 12th IEEE International Conference on Data Mining, ICDM 2012, Brussels, Belgium, December 10-13, 2012, pages 765–774, 2012. [8] K-means. https://en.wikipedia.org/wiki/K-means_clustering. [9] Bahman Bahmani, Benjamin Moseley, Andrea Vattani, Ravi Kumar, and Sergei Vassilvitskii. Scalable k-means++. PVLDB, 5(7):622–633, 2012. [10] Yarn, 2015. http://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-site/YARN.html. [11] Matei Zaharia, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, and Ion Stoica. Spark: Cluster computing with working sets. In 2nd USENIX Workshop on Hot Topics in Cloud Computing, HotCloud’10, Boston, MA, USA, June 22, 2010, 2010. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/53136 | - |
| dc.description.abstract | 在現在進入網路世代的世界,越來越多的資訊都轉移到電腦裡面而 不依賴紙本的傳遞,因此現代犯罪型態已漸漸轉移到網路的世界中, 其中病毒攻擊亦是目前最為惡名昭彰的犯罪型態,如何對抗電腦病毒 是目前資訊界最重要的課題之一。 傳統的病毒偵測是以特徵偵測,顧名思義就是把電腦病毒的程式碼 打開來看,若發現是有病毒的模式則回報系統,不過現在的駭客偽裝 病毒碼的技術日益精進,用特徵偵測的方式會遇到模式過多、不易偵 測的問題,因此在本研究中,我提出了使用推薦系統的方式套用到病 毒的歷史資訊來預測病毒,此預測是針對現在所流行的進階持續性滲 透攻擊,所以最後本研究會基於病毒的歷史資訊檔來導出可能存在的 進階持續性滲透攻擊。 | zh_TW |
| dc.description.abstract | When the world comes to web generation, more and more information transfers to computer instead of papers, so contemporary crime types gradually shift to internet. Malware (malicious software) attack is one of the most notorious crime types. Traditional malware detection is signature-based detection which recognizes malware pattern through malware binary codes. But now malware disguising technologies grow increasingly, signature-based detection faces many problems like many fake patterns. In our work, I propose a recommendation method using historical malware infection logs to predict malware. We focus on APT (advanced persistent threat). So finally we will use historical malware infection logs to predict APT. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-15T16:46:32Z (GMT). No. of bitstreams: 1 ntu-104-R02922079-1.pdf: 475274 bytes, checksum: 64001e30f7ec880e8663117cecc7bb98 (MD5) Previous issue date: 2015 | en |
| dc.description.tableofcontents | Acknowledgements i 摘要 ii Abstract iii 1 Introduction 1 2 Related Work 3 3 Problem Description 4 3.1 Data Description 4 3.2 Problem Statement 5 4 Methodology 6 4.1 Alternating Least Squares(ALS) 6 4.2 k-means 9 4.3 Filter 9 4.4 Spark 10 5 Experiments 11 6 Discussion 22 7 Conclusion 23 7.1 Conclusion 23 7.2 Future Work 23 Bibliography 24 | |
| dc.language.iso | en | |
| dc.subject | 巨量資料 | zh_TW |
| dc.subject | 病毒預測 | zh_TW |
| dc.subject | 推薦系統 | zh_TW |
| dc.subject | 機器學習 | zh_TW |
| dc.subject | 分群演算法 | zh_TW |
| dc.subject | Big Data | en |
| dc.subject | Malware Prediction | en |
| dc.subject | Recommendation System | en |
| dc.subject | Machine Learning | en |
| dc.subject | Clustering Algorithm | en |
| dc.title | 推薦系統:電腦病毒預測之專題研究 | zh_TW |
| dc.title | Recommendation: Case Study on Malware Prediction | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 103-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 徐慰中,蘇中才,黃維中,杜憶萍 | |
| dc.subject.keyword | 巨量資料,病毒預測,推薦系統,機器學習,分群演算法, | zh_TW |
| dc.subject.keyword | Big Data,Malware Prediction,Recommendation System,Machine Learning,Clustering Algorithm, | en |
| dc.relation.page | 25 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2015-08-10 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
| Appears in Collections: | 資訊工程學系 | |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| ntu-104-1.pdf Restricted Access | 464.13 kB | Adobe PDF |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
