scispace - formally typeset
J

Joohan Lee

Researcher at University of Central Florida

Publications -  13
Citations -  301

Joohan Lee is an academic researcher from University of Central Florida. The author has contributed to research in topics: Intrusion detection system & Anomaly-based intrusion detection system. The author has an hindex of 8, co-authored 13 publications receiving 278 citations.

Papers
More filters
Proceedings ArticleDOI

A survey of data mining techniques for malware detection using file features

TL;DR: This paper presents a survey of data mining techniques for malware detection using file features and categorizes the surveyed work based upon a three tier hierarchy that includes file features, analysis type and detection type.
Journal ArticleDOI

Efficient Virus Detection Using Dynamic Instruction Sequences

TL;DR: A novel approach to detect unknown virus using dynamic instruction sequences mining techniques and building a program monitor which is able to capture runtime instruction sequences of an arbitrary program is presented.
Proceedings Article

Data mining methods for malware detection using instruction sequences

TL;DR: A novel idea of automatically identifying critical instruction sequences that can classify between malicious and clean programs using data mining techniques is presented, formulated as a binary classification problem and built logistic regression, neural networks and decision tree models.
Proceedings ArticleDOI

A dynamic data mining technique for intrusion detection systems

TL;DR: The findings of the research in the area of anomaly-based intrusion detection systems are reported using data-mining techniques described in section 3.3 to create a decision tree model of the network using the 1999 DARPA Intrusion Detection Evaluation data set.
Book ChapterDOI

Detecting Trojans Using Data Mining Techniques

TL;DR: This paper presents the novel idea of extracting variable length instruction sequences that can identify trojan from clean programs using data mining techniques and shows a 94.0% detection rate on novel trojans whose data was not used in the model building process.