Summary:

 

The main idea presented in the paper is to use traditional Data Mining techniques for detecting malicious executables. The authors suggest that although, traditional signature methods and heuristics used do a good job of recognizing malicious pieces about which information is already fed to them, they still do not have the capability of detecting new malicious executables.

 

They present two simple yet effective data mining techniques for detecting new malicious code. However these techniques have been modified slightly to be able to run over binary code, instead of traditional data. They use the most basic classification technique that involves training the algorithm with some set of data. The main methods presented though are the Naïve Bayes and the Multi-Naïve Bayes Algorithms.

 

The main points that came out in the discussion were that although the paper doesn’t present a ground-breaking new scheme, it does a great job of using existing techniques from one field of computer science where it hasn’t been tried before. The solution presented for the problem is almost obvious on second thought.

 

Some of the pros and cons as seen by everyone in the discussion were:

 

Pros:

 

Cons:

 

The voting for the paper was as follows:

Accept: 1        Weak Accept : 3       

Reject: 0         Weak Reject :  4