Akour et al., 2016 - Google Patents
The malware detection challenge of accuracyAkour et al., 2016
- Document ID
- 8838352931870901966
- Author
- Akour M
- Alsmadi I
- Alazab M
- Publication year
- Publication venue
- 2016 2nd International Conference on Open Source Software Computing (OSSCOM)
External Links
Snippet
Real time Malware detection is still a big challenge; although considerable research showed advances of design and build systems that can automatically predicate the maliciousness of specific file, program, or website, Malware is continuously growing in terms of numbers and …
- 238000001514 detection method 0 title abstract description 67
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Poudyal et al. | A framework for analyzing ransomware using machine learning | |
Patil et al. | Malicious URLs detection using decision tree classifiers and majority voting technique | |
Singh et al. | Phishing detection from URLs using deep learning approach | |
Polamarasetti | Research developments, trends and challenges on the rise of machine learning for detection and classification of malware | |
Andrade et al. | A model based on LSTM neural networks to identify five different types of malware | |
Akour et al. | The malware detection challenge of accuracy | |
KR20140033145A (en) | System and method for non-signature based detection of malicious processes | |
Bahtiyar et al. | A multi-dimensional machine learning approach to predict advanced malware | |
Lu et al. | Ransomware detection based on V-detector negative selection algorithm | |
Banerjee et al. | Detection of XSS in web applications using Machine Learning Classifiers | |
Gyamfi et al. | Survey of mobile malware analysis, detection techniques and tool | |
US20240419793A1 (en) | Detection of malicious software packages using machine learning on code and community data | |
Alshamrani | Design and analysis of machine learning based technique for malware identification and classification of portable document format files | |
Tyagi et al. | Artificial Intelligence for Malware Analysis: A Systematic Study | |
Adebayo et al. | Malware detection, supportive software agents and its classification schemes | |
Mehrban et al. | Ransomware threat mitigation through network traffic analysis and machine learning techniques | |
Orunsolu et al. | An Anti-Phishing Kit Scheme for Secure Web Transactions. | |
Salem et al. | A sample proposal enhancing the security of the cloud computing system through deep learning and data mining | |
Khan et al. | A dynamic method of detecting malicious scripts using classifiers | |
Khan et al. | Hybrid feature classification approach for malicious javaScript attack detection using deep learning | |
Zhang et al. | Targeted malicious email detection using hypervisor-based dynamic analysis and ensemble learning | |
Negi et al. | A robust approach for malware attacks detection in the internet of things communications | |
James et al. | Malware attacks: A survey on mitigation measures | |
Joshi et al. | A Comprehensive Survey on Malware Detection Techniques | |
Radha Damodaram et al. | Bacterial foraging optimization for fake website detection |