{"title":"相似性哈希索引","authors":"Sunoh Choi, Youngsoo Kim, Jonghyun Kim","doi":"10.1109/ICTC.2018.8539650","DOIUrl":null,"url":null,"abstract":"Hundreds of thousands of new malicious files are being created every day. Existing pattern-based vaccine engines cannot detect these new malicious files. To solve these problems, artificial intelligence based malicious file detection methods have been proposed. However, artificial intelligence based malicious file detection method has a disadvantage that takes long time because it requires dynamic analysis. We can use similarity hashes to solve these problems and find similar files. However, it also takes a long time to compare similarity hashes when there are many files. To solve this problem, this paper proposes a method to generate similarity hash index.","PeriodicalId":417962,"journal":{"name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Similarity Hash Index\",\"authors\":\"Sunoh Choi, Youngsoo Kim, Jonghyun Kim\",\"doi\":\"10.1109/ICTC.2018.8539650\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Hundreds of thousands of new malicious files are being created every day. Existing pattern-based vaccine engines cannot detect these new malicious files. To solve these problems, artificial intelligence based malicious file detection methods have been proposed. However, artificial intelligence based malicious file detection method has a disadvantage that takes long time because it requires dynamic analysis. We can use similarity hashes to solve these problems and find similar files. However, it also takes a long time to compare similarity hashes when there are many files. To solve this problem, this paper proposes a method to generate similarity hash index.\",\"PeriodicalId\":417962,\"journal\":{\"name\":\"2018 International Conference on Information and Communication Technology Convergence (ICTC)\",\"volume\":\"102 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Information and Communication Technology Convergence (ICTC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTC.2018.8539650\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTC.2018.8539650","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hundreds of thousands of new malicious files are being created every day. Existing pattern-based vaccine engines cannot detect these new malicious files. To solve these problems, artificial intelligence based malicious file detection methods have been proposed. However, artificial intelligence based malicious file detection method has a disadvantage that takes long time because it requires dynamic analysis. We can use similarity hashes to solve these problems and find similar files. However, it also takes a long time to compare similarity hashes when there are many files. To solve this problem, this paper proposes a method to generate similarity hash index.