{"id":"https://openalex.org/W2972877457","doi":"https://doi.org/10.1109/asiajcis.2019.00-12","title":"Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques","display_name":"Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques","publication_year":2019,"publication_date":"2019-08-01","ids":{"openalex":"https://openalex.org/W2972877457","doi":"https://doi.org/10.1109/asiajcis.2019.00-12","mag":"2972877457"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/asiajcis.2019.00-12","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056318849","display_name":"Ryo Ito","orcid":null},"institutions":[{"id":"https://openalex.org/I443798","display_name":"National Defense Academy of Japan","ror":"https://ror.org/05xszy717","country_code":"JP","type":"education","lineage":["https://openalex.org/I443798"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ryo Ito","raw_affiliation_strings":["Department of Computer Science, National Defense Academy, Yokosuka, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Defense Academy, Yokosuka, Japan","institution_ids":["https://openalex.org/I443798"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023133164","display_name":"Mamoru Mimura","orcid":"https://orcid.org/0000-0003-4323-9911"},"institutions":[{"id":"https://openalex.org/I443798","display_name":"National Defense Academy of Japan","ror":"https://ror.org/05xszy717","country_code":"JP","type":"education","lineage":["https://openalex.org/I443798"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mamoru Mimura","raw_affiliation_strings":["Department of Computer Science, National Defense Academy, Yokosuka, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National Defense Academy, Yokosuka, Japan","institution_ids":["https://openalex.org/I443798"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.812,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":10,"citation_normalized_percentile":{"value":0.646243,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9965,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.8135177},{"id":"https://openalex.org/keywords/sandbox","display_name":"Sandbox (software development)","score":0.72384256},{"id":"https://openalex.org/keywords/ascii","display_name":"ASCII","score":0.68154585},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.43226653}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9461312},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8296387},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.8135177},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.72384256},{"id":"https://openalex.org/C196832560","wikidata":"https://www.wikidata.org/wiki/Q8815","display_name":"ASCII","level":2,"score":0.68154585},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.62190336},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.48485458},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.43396366},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.43226653},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2289123},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14275986},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/asiajcis.2019.00-12","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":13,"referenced_works":["https://openalex.org/W1893133781","https://openalex.org/W1987214724","https://openalex.org/W2010065958","https://openalex.org/W2045140281","https://openalex.org/W2131744502","https://openalex.org/W2141599568","https://openalex.org/W2164163973","https://openalex.org/W2384622762","https://openalex.org/W2586608967","https://openalex.org/W2789326120","https://openalex.org/W2882319491","https://openalex.org/W2949547296","https://openalex.org/W4239510810"],"related_works":["https://openalex.org/W4367595269","https://openalex.org/W4240624848","https://openalex.org/W3208250511","https://openalex.org/W3098313552","https://openalex.org/W2765820957","https://openalex.org/W2355810117","https://openalex.org/W2034129977","https://openalex.org/W2033352828","https://openalex.org/W1995118279","https://openalex.org/W1745773915"],"abstract_inverted_index":{"Attackers":[0],"often":[1],"use":[2,89],"an":[3],"executable":[4,67,130],"file":[5],"(malware)":[6],"as":[7,92],"a":[8,48,93,102,167,173,186],"tool":[9],"to":[10,22,35,88],"obtain":[11],"sensitive":[12],"information":[13],"from":[14,66,209],"specific":[15],"companies":[16],"and":[17,119,128,202],"individuals.":[18],"Anti-virus":[19],"software":[20],"attempts":[21],"detect":[23,36],"the":[24,56,75,121,124,135,140,157,161,214],"malware":[25,38,44,94,103,192,197,228],"by":[26,47,200],"pattern":[27],"matching":[28],"method":[29,54,105,113,165,212,225],"etc.":[30,50],"However,":[31],"it":[32,84],"is":[33,45,85],"difficult":[34],"unknown":[37,43,227],"in":[39,149],"these":[40,90,115],"methods.":[41],"The":[42,219],"detected":[46],"sandbox,":[49],"We":[51],"consider":[52,154],"another":[53],"because":[55],"sandbox":[57],"requires":[58],"much":[59],"time":[60],"for":[61,71],"running.":[62],"ASCII":[63,107],"strings":[64,91,108,116],"extracted":[65],"files":[68,207],"are":[69,147],"helpful":[70],"analyzing":[72],"malware.":[73],"With":[74],"recent":[76],"development":[77],"of":[78,123,137,142,169],"natural":[79,177],"language":[80,178],"processing":[81,179],"(NLP)":[82],"techniques,":[83],"becoming":[86],"possible":[87],"detection":[95,104,162],"method.":[96],"In":[97,181],"this":[98],"paper,":[99],"we":[100,153,184],"propose":[101],"using":[106],"with":[109,134,176,229],"NLP":[110,150],"techniques.":[111,151,180],"Our":[112,164,211],"divides":[114],"into":[117,172],"words,":[118,144],"distinguishes":[120],"difference":[122],"words":[125,138,146,159,171],"between":[126],"benign":[127,206],"malicious":[129],"files.":[131],"To":[132],"compare":[133],"arrangement":[136],"or":[139],"frequency":[141],"appearing":[143],"uncommon":[145,158],"unnecessary":[148],"Thus,":[152],"that":[155,223],"reducing":[156],"improves":[160],"rate.":[163],"converts":[166],"corpus":[168],"frequent":[170],"feature":[174],"vector":[175],"our":[182,224],"experiments,":[183],"used":[185],"dataset":[187],"containing":[188],"more":[189,203,216],"than":[190,195,204,217],"23,000":[191],"samples":[193],"(more":[194],"2,100":[196],"families)":[198],"provided":[199],"FFRI":[201],"16,000":[205],"collected":[208],"\"download.cnet.com\".":[210],"achieves":[213],"F-measure":[215],"0.85.":[218],"experimental":[220],"results":[221],"show":[222],"detects":[226],"high":[230],"accuracy.":[231]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2972877457","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3}],"updated_date":"2025-01-16T17:19:38.699690","created_date":"2019-09-19"}