[HTML][HTML] The rise of machine learning for detection and classification of malware: Research developments, trends and challenges
The struggle between security analysts and malware developers is a never-ending battle
with the complexity of malware changing as quickly as innovation grows. Current state-of-the …
with the complexity of malware changing as quickly as innovation grows. Current state-of-the …
Machine learning aided static malware analysis: A survey and tutorial
Malware analysis and detection techniques have been evolving during the last decade as a
reflection to development of different malware techniques to evade network-based and host …
reflection to development of different malware techniques to evade network-based and host …
Behavior-based features model for malware detection
HS Galal, YB Mahdy, MA Atiea - Journal of Computer Virology and …, 2016 - Springer
The sharing of malicious code libraries and techniques over the Internet has vastly
increased the release of new malware variants in an unprecedented rate. Malware variants …
increased the release of new malware variants in an unprecedented rate. Malware variants …
RansomWall: A layered defense system against cryptographic ransomware attacks using machine learning
SK Shaukat, VJ Ribeiro - 2018 10th international conference …, 2018 - ieeexplore.ieee.org
Recent worldwide cybersecurity attacks caused by Cryptographic Ransomware infected
systems across countries and organizations with millions of dollars lost in paying extortion …
systems across countries and organizations with millions of dollars lost in paying extortion …
NF-GNN: network flow graph neural networks for malware detection and classification
Malicious software (malware) poses an increasing threat to the security of communication
systems as the number of interconnected mobile devices increases exponentially. While …
systems as the number of interconnected mobile devices increases exponentially. While …
Malware detection systems based on API log data mining
CI Fan, HW Hsiao, CH Chou… - 2015 IEEE 39th annual …, 2015 - ieeexplore.ieee.org
As information technology improves, the Internet is involved in every area in our daily life.
When the mobile devices and cloud computing technology start to play important parts of our …
When the mobile devices and cloud computing technology start to play important parts of our …
Malware detection and classification based on extraction of API sequences
D Uppal, R Sinha, V Mehra… - … International conference on …, 2014 - ieeexplore.ieee.org
With the substantial growth of IT sector in the 21st century, the need for system security has
also become inevitable. While the developments in the IT sector have innumerable …
also become inevitable. While the developments in the IT sector have innumerable …
MAAR: Robust features to detect malicious activity based on API calls, their arguments and return values
Z Salehi, A Sami, M Ghiasi - Engineering Applications of Artificial …, 2017 - Elsevier
Basically malware detection techniques are either: static analysis or dynamic analysis. Static
analysis explores malware code without executing it while dynamic analysis relies on run …
analysis explores malware code without executing it while dynamic analysis relies on run …
Android malware detection using complex-flows
F Shen, J Del Vecchio, A Mohaisen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper proposes a new technique to detect mobile malware based on information flow
analysis. Our approach examines the structure of information flows to identify patterns of …
analysis. Our approach examines the structure of information flows to identify patterns of …
Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits
K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …
changing battlefield over who can innovate over the other. While security analysts are …