Kumar et al., 2020 - Google Patents

Detection of malware using deep learning techniques

Kumar et al., 2020

View PDF
Document ID
15429875854620412458
Author
Kumar G
Bagane P
Publication year
Publication venue
International Journal of Scientific and Technology Research

External Links

Snippet

Malware continues to be a serious threat starting from home users to large enterprises. This makes it a hot research topic. Detection of malware is done using static and dynamic analysis of malware signatures and behavior patterns. These are proven to be ineffective …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Namanya et al. Similarity hash based scoring of portable executable files for efficient malware detection in IoT
Nguyen et al. PSI-rooted subgraph: A novel feature for IoT botnet detection using classifier algorithms
Shobana et al. A novel approach to detect IoT malware by system calls using Deep learning techniques
Bagane et al. Classification of Malware using Deep Learning Techniques
Sun et al. An opcode sequences analysis method for unknown malware detection
Wang et al. Machine learning based cross-site scripting detection in online social network
WO2018066221A1 (en) Classification device, classification method, and classification program
Zhao et al. Malicious executables classification based on behavioral factor analysis
Welderman et al. A robust system for ransomware detection using temporal behavior modeling
Poudyal et al. Malware analytics: Review of data mining, machine learning and big data perspectives
Bayazit et al. Neural network based Android malware detection with different IP coding methods
Kumar et al. Detection of malware using deep learning techniques
Kalyan et al. Detection of malware using cnn
Masabo et al. Improvement of malware classification using hybrid feature engineering
Khan et al. A dynamic method of detecting malicious scripts using classifiers
Priya et al. Review on Malware Classification and Malware Detection Using Transfer Learning Approach
Dey et al. Byte label malware classification using image entropy
Irawan et al. Malware Detection and Classification Model Using Machine Learning Random Forest Approach
Kamundala et al. CNN Model to Classify Malware Using Image Feature
Sawaisarje et al. Malware detection based on string length histogram using machine learning
Reddy et al. MDC-Net: Intelligent Malware Detection and Classification using Extreme Learning Machine
Rana et al. Machine Learning Approach for Malware Analysis and Detection
Najafi et al. Nlp-based entity behavior analytics for malware detection
Ayeni A Supervised Machine Learning Algorithm for Detecting Malware
Hao et al. AutoMal: automatic clustering and signature generation for malwares based on the network flow