[go: up one dir, main page]

Akour et al., 2016 - Google Patents

The malware detection challenge of accuracy

Akour et al., 2016

Document ID
8838352931870901966
Author
Akour M
Alsmadi I
Alazab M
Publication year
Publication venue
2016 2nd International Conference on Open Source Software Computing (OSSCOM)

External Links

Snippet

Real time Malware detection is still a big challenge; although considerable research showed advances of design and build systems that can automatically predicate the maliciousness of specific file, program, or website, Malware is continuously growing in terms of numbers and …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition

Similar Documents

Publication Publication Date Title
Poudyal et al. A framework for analyzing ransomware using machine learning
Patil et al. Malicious URLs detection using decision tree classifiers and majority voting technique
Singh et al. Phishing detection from URLs using deep learning approach
Polamarasetti Research developments, trends and challenges on the rise of machine learning for detection and classification of malware
Andrade et al. A model based on LSTM neural networks to identify five different types of malware
Akour et al. The malware detection challenge of accuracy
KR20140033145A (en) System and method for non-signature based detection of malicious processes
Bahtiyar et al. A multi-dimensional machine learning approach to predict advanced malware
Lu et al. Ransomware detection based on V-detector negative selection algorithm
Banerjee et al. Detection of XSS in web applications using Machine Learning Classifiers
Gyamfi et al. Survey of mobile malware analysis, detection techniques and tool
US20240419793A1 (en) Detection of malicious software packages using machine learning on code and community data
Alshamrani Design and analysis of machine learning based technique for malware identification and classification of portable document format files
Tyagi et al. Artificial Intelligence for Malware Analysis: A Systematic Study
Adebayo et al. Malware detection, supportive software agents and its classification schemes
Mehrban et al. Ransomware threat mitigation through network traffic analysis and machine learning techniques
Orunsolu et al. An Anti-Phishing Kit Scheme for Secure Web Transactions.
Salem et al. A sample proposal enhancing the security of the cloud computing system through deep learning and data mining
Khan et al. A dynamic method of detecting malicious scripts using classifiers
Khan et al. Hybrid feature classification approach for malicious javaScript attack detection using deep learning
Zhang et al. Targeted malicious email detection using hypervisor-based dynamic analysis and ensemble learning
Negi et al. A robust approach for malware attacks detection in the internet of things communications
James et al. Malware attacks: A survey on mitigation measures
Joshi et al. A Comprehensive Survey on Malware Detection Techniques
Radha Damodaram et al. Bacterial foraging optimization for fake website detection