{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:24:56Z","timestamp":1740115496837,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"abstract":"<jats:p>The best way to detect new malware or their variants is malware classification. Static and dynamic analysis are most common ways for malware classification. Dynamic analysis is behavior based analysis approach, analysts perform malware in a sandbox (usually in a virtual machine) to observe their behavior. Static analysis is signature based analysis approach, analysts either applies reverse engineering approach or analyses binary code directly to get the signatures of malware. While deployment of honeypot in organizations have become popular, more and more malware which contain source codes and binary files could be captured. Most existing malware analysis approaches focused on analyzing of only single binary file that do not suitable for malware captured by honeypot. Therefore, a classification system for honeypot captured malware is needed in organizations. Moreover, as the number of captured malware increases, analysis and forensics become a new challenge. For IT security staff, how to identify which malware is new or serious attack which needs advanced analysis, and which malware is out-of-date attack which could be ignored from a great volume of captured malware is a critical issue.<\/jats:p>","DOI":"10.3233\/978-1-61499-484-8-925","type":"book-chapter","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T12:06:08Z","timestamp":1740053168000},"source":"Crossref","is-referenced-by-count":0,"title":["An efficient honeypot based malware classification system"],"prefix":"10.3233","author":[{"family":"Chen Chia-Mei","sequence":"additional","affiliation":[]},{"family":"Lai Gu-Hsin","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","Intelligent Systems and Applications"],"original-title":[],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T12:07:18Z","timestamp":1740053238000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISSNISBN&issn=0922-6389&volume=274&spage=925"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-61499-484-8-925","relation":{},"ISSN":["0922-6389"],"issn-type":[{"value":"0922-6389","type":"print"}],"subject":[],"published":{"date-parts":[[2015]]}}}