The use of operating system API calls is a promising task in the detection of
PE-type malware in the Windows operating system. This task is officially
defined as running malware in an isolated sandbox environment, recording the
API calls made with the Windows operating system and sequentially analyzing
these calls. Here, we have analyzed 7107 different malicious software belonging
to various families such as virus, backdoor, trojan in an isolated sandbox
environment and transformed these analysis results into a format where
different classification algorithms and methods can be used. First, we’ll
explain how we got the malware, and then we’ll explain how we’ve got these
software bundled into families. Finally, we will describe how to perform
malware classification tasks using different computational methods for the
researchers who will use the data set we have created.

Go to Source of this post
Author Of this post: <a href="http://arxiv.org/find/cs/1/au:+Catak_F/0/1/0/all/0/1">Ferhat Ozgur Catak</a>, <a href="http://arxiv.org/find/cs/1/au:+Yazi_A/0/1/0/all/0/1">Ahmet Faruk Yaz&#x131;</a>

By admin