Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
    • Advisor
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊工程學系
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/53136
Full metadata record
???org.dspace.app.webui.jsptag.ItemTag.dcfield???ValueLanguage
dc.contributor.advisor廖世偉(Shih-Wei Liao)
dc.contributor.authorYi-Ting Weien
dc.contributor.author魏翊庭zh_TW
dc.date.accessioned2021-06-15T16:46:32Z-
dc.date.available2020-08-28
dc.date.copyright2015-08-28
dc.date.issued2015
dc.date.submitted2015-08-10
dc.identifier.citation[1] Konrad Rieck, Philipp Trinius, Carsten Willems, and Thorsten Holz. Automatic analysis of malware behavior using machine learning. Journal of Computer Security,
19(4):639–668, 2011.
[2] Gil Tahan, Lior Rokach, and Yuval Shahar. Mal-id: Automatic malware detection using common segment analysis and meta-features. Journal of Machine Learning
Research, 13:949–979, 2012.
[3] Yanfang Ye, Dingding Wang, Tao Li, and Dongyi Ye. IMDS: intelligent malware
detection system. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12-15, 2007, pages 1043–1047, 2007.
[4] Duen Horng Chau, Carey Nachenberg, Jeffrey Wilhelm, Adam Wright, and Christos Faloutsos. Polonium: Tera-scale graph mining for malware detection. In ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2010.
[5] Jyun-Yu Jiang, Chun-Liang Li, Chun-Pai Yang, and Chung-Tsai Su. POSTER: scanning-free personalized malware warning system by learning implicit feedback
from detection logs. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pages 1436–1438, 2014.
[6] Yunhong Zhou, Dennis M. Wilkinson, Robert Schreiber, and Rong Pan. Large-scale parallel collaborative filtering for the netflix prize. In Algorithmic Aspects in In-formation and Management, 4th International Conference, AAIM 2008, Shanghai, China, June 23-25, 2008. Proceedings, pages 337–348, 2008.
[7] Hsiang-Fu Yu, Cho-Jui Hsieh, Si Si, and Inderjit S. Dhillon. Scalable coordinate descent approaches to parallel matrix factorization for recommender systems. In 12th IEEE International Conference on Data Mining, ICDM 2012, Brussels, Belgium, December 10-13, 2012, pages 765–774, 2012.
[8] K-means. https://en.wikipedia.org/wiki/K-means_clustering.
[9] Bahman Bahmani, Benjamin Moseley, Andrea Vattani, Ravi Kumar, and Sergei Vassilvitskii.
Scalable k-means++. PVLDB, 5(7):622–633, 2012.
[10] Yarn, 2015. http://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-site/YARN.html.
[11] Matei Zaharia, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, and Ion Stoica. Spark: Cluster computing with working sets. In 2nd USENIX Workshop on
Hot Topics in Cloud Computing, HotCloud’10, Boston, MA, USA, June 22, 2010, 2010.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/53136-
dc.description.abstract在現在進入網路世代的世界,越來越多的資訊都轉移到電腦裡面而
不依賴紙本的傳遞,因此現代犯罪型態已漸漸轉移到網路的世界中,
其中病毒攻擊亦是目前最為惡名昭彰的犯罪型態,如何對抗電腦病毒
是目前資訊界最重要的課題之一。
傳統的病毒偵測是以特徵偵測,顧名思義就是把電腦病毒的程式碼
打開來看,若發現是有病毒的模式則回報系統,不過現在的駭客偽裝
病毒碼的技術日益精進,用特徵偵測的方式會遇到模式過多、不易偵
測的問題,因此在本研究中,我提出了使用推薦系統的方式套用到病
毒的歷史資訊來預測病毒,此預測是針對現在所流行的進階持續性滲
透攻擊,所以最後本研究會基於病毒的歷史資訊檔來導出可能存在的
進階持續性滲透攻擊。
zh_TW
dc.description.abstractWhen the world comes to web generation, more and more information transfers to computer instead of papers, so contemporary crime types gradually shift to internet. Malware (malicious software) attack is one of the most
notorious crime types.
Traditional malware detection is signature-based detection which recognizes malware pattern through malware binary codes. But now malware disguising technologies grow increasingly, signature-based detection faces many
problems like many fake patterns. In our work, I propose a recommendation method using historical malware infection logs to predict malware. We focus on APT (advanced persistent threat). So finally we will use historical malware infection logs to predict APT.
en
dc.description.provenanceMade available in DSpace on 2021-06-15T16:46:32Z (GMT). No. of bitstreams: 1
ntu-104-R02922079-1.pdf: 475274 bytes, checksum: 64001e30f7ec880e8663117cecc7bb98 (MD5)
Previous issue date: 2015
en
dc.description.tableofcontentsAcknowledgements i
摘要 ii
Abstract iii
1 Introduction 1
2 Related Work 3
3 Problem Description 4
3.1 Data Description 4
3.2 Problem Statement 5
4 Methodology 6
4.1 Alternating Least Squares(ALS) 6
4.2 k-means 9
4.3 Filter 9
4.4 Spark 10
5 Experiments 11
6 Discussion 22
7 Conclusion 23
7.1 Conclusion 23
7.2 Future Work 23
Bibliography 24
dc.language.isoen
dc.subject巨量資料zh_TW
dc.subject病毒預測zh_TW
dc.subject推薦系統zh_TW
dc.subject機器學習zh_TW
dc.subject分群演算法zh_TW
dc.subjectBig Dataen
dc.subjectMalware Predictionen
dc.subjectRecommendation Systemen
dc.subjectMachine Learningen
dc.subjectClustering Algorithmen
dc.title推薦系統:電腦病毒預測之專題研究zh_TW
dc.titleRecommendation: Case Study on Malware Predictionen
dc.typeThesis
dc.date.schoolyear103-2
dc.description.degree碩士
dc.contributor.oralexamcommittee徐慰中,蘇中才,黃維中,杜憶萍
dc.subject.keyword巨量資料,病毒預測,推薦系統,機器學習,分群演算法,zh_TW
dc.subject.keywordBig Data,Malware Prediction,Recommendation System,Machine Learning,Clustering Algorithm,en
dc.relation.page25
dc.rights.note有償授權
dc.date.accepted2015-08-10
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊工程學研究所zh_TW
Appears in Collections:資訊工程學系

Files in This Item:
File SizeFormat 
ntu-104-1.pdf
  Restricted Access
464.13 kBAdobe PDF
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved