Kumar et al., 2020 - Google Patents
Detection of malware using deep learning techniquesKumar et al., 2020
View PDF- Document ID
- 15429875854620412458
- Author
- Kumar G
- Bagane P
- Publication year
- Publication venue
- International Journal of Scientific and Technology Research
External Links
Snippet
Malware continues to be a serious threat starting from home users to large enterprises. This makes it a hot research topic. Detection of malware is done using static and dynamic analysis of malware signatures and behavior patterns. These are proven to be ineffective …
- 238000013135 deep learning 0 title abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Namanya et al. | Similarity hash based scoring of portable executable files for efficient malware detection in IoT | |
Nguyen et al. | PSI-rooted subgraph: A novel feature for IoT botnet detection using classifier algorithms | |
Shobana et al. | A novel approach to detect IoT malware by system calls using Deep learning techniques | |
Bagane et al. | Classification of Malware using Deep Learning Techniques | |
Sun et al. | An opcode sequences analysis method for unknown malware detection | |
Wang et al. | Machine learning based cross-site scripting detection in online social network | |
WO2018066221A1 (en) | Classification device, classification method, and classification program | |
Zhao et al. | Malicious executables classification based on behavioral factor analysis | |
Welderman et al. | A robust system for ransomware detection using temporal behavior modeling | |
Poudyal et al. | Malware analytics: Review of data mining, machine learning and big data perspectives | |
Bayazit et al. | Neural network based Android malware detection with different IP coding methods | |
Kumar et al. | Detection of malware using deep learning techniques | |
Kalyan et al. | Detection of malware using cnn | |
Masabo et al. | Improvement of malware classification using hybrid feature engineering | |
Khan et al. | A dynamic method of detecting malicious scripts using classifiers | |
Priya et al. | Review on Malware Classification and Malware Detection Using Transfer Learning Approach | |
Dey et al. | Byte label malware classification using image entropy | |
Irawan et al. | Malware Detection and Classification Model Using Machine Learning Random Forest Approach | |
Kamundala et al. | CNN Model to Classify Malware Using Image Feature | |
Sawaisarje et al. | Malware detection based on string length histogram using machine learning | |
Reddy et al. | MDC-Net: Intelligent Malware Detection and Classification using Extreme Learning Machine | |
Rana et al. | Machine Learning Approach for Malware Analysis and Detection | |
Najafi et al. | Nlp-based entity behavior analytics for malware detection | |
Ayeni | A Supervised Machine Learning Algorithm for Detecting Malware | |
Hao et al. | AutoMal: automatic clustering and signature generation for malwares based on the network flow |