{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T04:35:07Z","timestamp":1648787707312},"reference-count":26,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Networks and Communications"],"published-print":{"date-parts":[[2011]]},"abstract":"<jats:p>Grayware encyclopedias collect known species to provide information for incident analysis, however, the lack of categorization and generalization capability renders them ineffective in the development of defense strategies against clustered strains. A grayware categorization framework is therefore proposed here to not only classify grayware according to diverse taxonomic features but also facilitate evaluations on grayware risk to cyberspace. Armed with Support Vector Machines, the framework builds learning models based on training data extracted automatically from grayware encyclopedias and visualizes categorization results with Self-Organizing Maps. The features used in learning models are selected with information gain and the high dimensionality of feature space is reduced by word stemming and stopword removal process. The grayware categorizations on diversified features reveal that grayware typically attempts to improve its penetration rate by resorting to multiple installation mechanisms and reduced code footprints. The framework also shows that grayware evades detection by attacking victims' security applications and resists being removed by enhancing its clotting capability with infected hosts. Our analysis further points out that species in categories<jats:italic>Spyware<\/jats:italic>and<jats:italic>Adware<\/jats:italic>continue to dominate the grayware landscape and impose extremely critical threats to the Internet ecosystem.<\/jats:p>","DOI":"10.1155\/2011\/569829","type":"journal-article","created":{"date-parts":[[2011,10,5]],"date-time":"2011-10-05T00:37:27Z","timestamp":1317775047000},"page":"1-28","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating Grayware Characteristics and Risks"],"prefix":"10.1155","volume":"2011","author":[{"given":"Zhongqiang","family":"Chen","sequence":"first","affiliation":[{"name":"Yahoo! Inc., Sunnyvale, CA 94089, USA"}]},{"given":"Zhanyan","family":"Liang","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Guangxi University of Finance and Economics, Guangxi 530003, China"}]},{"given":"Yuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Florida State University, Tallahassee, FL 32306, USA"}]},{"given":"Zhongrong","family":"Chen","sequence":"additional","affiliation":[{"name":"Corporate Accounts, Shire Pharmaceuticals, Inc. Wayne, PA 19087, USA"}]}],"member":"98","reference":[{"key":"53","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076244"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076240"},{"key":"46","first-page":"291","volume":"14","year":"2004","journal-title":"Communications of AIS"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.05.027"},{"key":"51","year":"1999"},{"key":"26","first-page":"1289\u2013","volume":"3","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"36","year":"2000"},{"issue":"3","key":"30","doi-asserted-by":"crossref","first-page":"10\u2013","DOI":"10.1109\/MSECP.2003.1203216","volume":"1","year":"2003","journal-title":"IEEE Security & Privacy"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1111\/j.0956-7976.2004.00681.x"},{"issue":"9","key":"12","first-page":"3\u2013","volume":"7","year":"2004","journal-title":"Journal of Internet Law"},{"key":"37","volume-title":"Behavioral Classification","year":"2006"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.04.002"},{"key":"44","year":"2002"},{"issue":"2","key":"13","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","year":"1998","journal-title":"Data Mining and Knowledge Discovery"},{"key":"33","volume-title":"Making large-scale support vector machine learning practical","year":"1999"},{"issue":"2","key":"16","first-page":"143","volume":"1","year":"2001","journal-title":"Journal of Machine Learning Research"},{"key":"40","volume-title":"Fast training of Support Vector Machines using sequential minimal optimization","year":"1999"},{"key":"35","volume":"6","year":"2005","journal-title":"Journal of Machine Learning Research"},{"issue":"2","key":"3","first-page":"113","volume":"1","year":"2001","journal-title":"Journal of Machine Learning Research"},{"issue":"2","key":"32","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1214\/aos\/1028144844","volume":"26","year":"1998","journal-title":"Annals of Statistics"},{"key":"21","doi-asserted-by":"crossref","first-page":"263\u2013","DOI":"10.1613\/jair.105","volume":"2","year":"1995","journal-title":"Journal of Artificial Intelligence Research"},{"key":"41","first-page":"547\u2013","volume":"12","year":"2000","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"1-3","key":"11","first-page":"53","volume":"12","year":"1999","journal-title":"Computational Optimization and Applications"},{"key":"18","first-page":"265","volume":"2","year":"2001","journal-title":"Journal of Machine Learning Research"},{"issue":"5","key":"43","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","volume":"24","year":"1988","journal-title":"Information Processing and Management"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1108\/00330330610681286"}],"container-title":["Journal of Computer Networks and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2011\/569829.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2011\/569829.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2011\/569829.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T02:23:53Z","timestamp":1560738233000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/jcnc\/2011\/569829\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"references-count":26,"alternative-id":["569829","569829"],"URL":"https:\/\/doi.org\/10.1155\/2011\/569829","relation":{},"ISSN":["2090-7141","2090-715X"],"issn-type":[{"value":"2090-7141","type":"print"},{"value":"2090-715X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}