首页> 外文会议>International Conference on Information Technology Systems and Innovation >Searching for Malware Dataset: a Systematic Literature Review
【24h】

Searching for Malware Dataset: a Systematic Literature Review

机译:搜索恶意软件数据集:系统文献综述

获取原文

摘要

Malware is one of the exciting topics widely discussed by both academicians and researchers, but the source list of malware rarely provided. Therefore, this paper aims to write a Systematic Literature Review (SLR) to find which datasets are commonly used by previous researchers. The three journal databases were used in this study, including IEEE, science direct, and ACM. The PRISMA statement was applied to maintain transparency during the literature review. To facilitate the search, the authors also provide limitations during the SLR process (inclusion and exclusion). The inclusion includes: (1) full article fully written in English; (2) peer-reviewed papers; (3) explicitly mentioning the name of dataset or database; and (4) explicitly mentioning the method to find malware characteristics and behavior. While the exclusion consists of: (1) articles written before 2015; (2) book and white paper; (3) article already indexed in another database journal; and (4) paper which is less than four pages. After both filter processes, there are 42 out of 245 articles eligible to answer the stated research question (RQ), which were: (1) where does the researcher usually find the malware database or dataset?; (2) what kind of methods applied by previous researchers to find the malware’s characteristics or behavior?; and (3) which platforms that malware usually attacks are? Based on the three RQs, we could conclude that RQ1 recorded for 37 datasets, RQ2 recorded for 47 methods, and RQ3 recorded for six platforms.
机译:恶意软件是学者和研究人员广泛讨论的令人兴奋的话题之一,但是很少提供恶意软件的来源列表。因此,本文旨在编写一份系统文献综述(SLR),以查找以前的研究人员常用的数据集。本研究使用了三个期刊数据库,包括IEEE,Science Direct和ACM。 PRISMA声明适用于在文献回顾过程中保持透明性。为了方便搜索,作者还在SLR过程(包括和排除)中提供了限制。其中包括:(1)全文以英文撰写; (2)同行评审论文; (3)明确提及数据集或数据库的名称; (4)明确提及发现恶意软件特征和行为的方法。排除内容包括:(1)2015年之前撰写的文章; (2)书籍和白皮书; (3)文章已在另一个数据库日记中建立索引; (4)少于四页的纸。经过这两个筛选过程,在245篇文章中有42篇可以回答所述研究问题(RQ),它们是:(1)研究人员通常在哪里找到恶意软件数据库或数据集? (2)以前的研究人员使用哪种方法来发现恶意软件的特征或行为? (3)恶意软件通常会攻击哪些平台?基于这三个RQ,我们可以得出结论:RQ1记录了37个数据集,RQ2记录了47种方法,RQ3记录了六个平台。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号