A comprehensive review on malware detection approaches

ÖA Aslan, R Samet - IEEE access, 2020 - ieeexplore.ieee.org
According to the recent studies, malicious software (malware) is increasing at an alarming
rate, and some malware can hide in the system by using different obfuscation techniques. In …

A survey on malware detection using data mining techniques

Y Ye, T Li, D Adjeroh, SS Iyengar - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …

A new malware classification framework based on deep learning algorithms

Ö Aslan, AA Yilmaz - Ieee Access, 2021 - ieeexplore.ieee.org
Recent technological developments in computer systems transfer human life from real to
virtual environments. Covid-19 disease has accelerated this process. Cyber criminals' …

Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions

BAS Al-Rimy, MA Maarof, SZM Shaid - Computers & Security, 2018 - Elsevier
Ransomware is a malware category that exploits security mechanisms such as cryptography
in order to hijack user files and related resources and demands money in exchange for the …

A survey of crypto ransomware attack detection methodologies: an evolving outlook

A Alqahtani, FT Sheldon - Sensors, 2022 - mdpi.com
Recently, ransomware attacks have been among the major threats that target a wide range
of Internet and mobile users throughout the world, especially critical cyber physical systems …

Toward an online anomaly intrusion detection system based on deep learning

K Alrawashdeh, C Purdy - 2016 15th IEEE international …, 2016 - ieeexplore.ieee.org
In the past twenty years, progress in intrusion detection has been steady but slow. The
biggest challenge is to detect new attacks in real time. In this work, a deep learning …

A survey on malware analysis and mitigation techniques

SS Chakkaravarthy, D Sangeetha, V Vaidehi - Computer Science Review, 2019 - Elsevier
In recent days, malwares are advanced, sophisticatedly engineered to attack the target. Most
of such advanced malwares are highly persistent and capable of escaping from the security …

The rise of ransomware: Forensic analysis for windows based ransomware attacks

I Kara, M Aydos - Expert Systems with Applications, 2022 - Elsevier
While information technologies grow and propagate worldwide, malwares have modified
and risen their efficiency towards information system. Recently, the attackers have started to …

Host-based intrusion detection system with system calls: Review and future trends

M Liu, Z Xue, X Xu, C Zhong, J Chen - ACM computing surveys (CSUR), 2018 - dl.acm.org
In a contemporary data center, Linux applications often generate a large quantity of real-time
system call traces, which are not suitable for traditional host-based intrusion detection …

DroidEncoder: Malware detection using auto-encoder based feature extractor and machine learning algorithms

H Bakır, R Bakır - Computers and Electrical Engineering, 2023 - Elsevier
Android Malware detection became a hot topic over the last several years. Although
considerable studies have been conducted utilizing machine learning-based methods, little …