[go: up one dir, main page]

AliAhmad et al., 2023 - Google Patents

Malware detection issues, future trends and challenges: a survey

AliAhmad et al., 2023

View PDF
Document ID
13187854573711132380
Author
AliAhmad A
Eleyan D
Eleyan A
Bejaoui T
Zolkipli M
Al-Khalidi M
Publication year
Publication venue
2023 International Symposium on Networks, Computers and Communications (ISNCC)

External Links

Snippet

This paper focuses on the challenges and issues of detecting malware in to-day's world where cyberattacks continue to grow in number and complexity. The paper reviews current trends and technologies in malware detection and the limitations of existing detection …
Continue reading at e-space.mmu.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30873Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/30707Clustering or classification into predefined classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30899Browsing optimisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30994Browsing or visualization
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition

Similar Documents

Publication Publication Date Title
Polamarasetti Research developments, trends and challenges on the rise of machine learning for detection and classification of malware
Rani et al. Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art
Laurenza et al. Malware triage for early identification of advanced persistent threat activities
AliAhmad et al. Malware detection issues, future trends and challenges: a survey
US20240241956A1 (en) Classifying cybersecurity threats using machine learning on non-euclidean data
Mohamed et al. Detecting malicious android applications based on API calls and permissions using machine learning algorithms
Mohaisen et al. Network-based analysis and classification of malware using behavioral artifacts ordering
Howard et al. pSigene: Webcrawling to generalize SQL injection signatures
Alghamdi et al. Detect keyloggers by using machine learning
Waheed et al. Evolving trees for detecting android malware using evolutionary learning
Kumar et al. IOT malware detection using static and dynamic analysis techniques: A systematic literature review
Weshahi et al. IoT-Enhanced Malicious URL Detection Using Machine Learning
Ponnuru et al. A malware classification survey on adversarial attacks and defences
Ferdous et al. Malware resistant data protection in hyper-connected networks: A survey
Aledam et al. Enhanced Malware Detection for Mobile Operating Systems Using Machine Learning and Dynamic Analysis.
Ngirande et al. Detection and Analysis of Android Ransomware Using the Support Vector Machines
Shehata et al. Comparative Study for Andriod Mobile Static Analysis Algorithms
Vijay et al. Android-based smartphone malware exploit prevention using a machine learning-based runtime detection system
Yuksel et al. A machine learning approach to malware detection using application programming interface calls (MDAPI)
Maniriho et al. Evaluation and survey of state of the art malware detection and classification techniques: Analysis and recommendation
Abduraimova et al. Comparative study of machine learning applications in malware forensics
Alamyar Detecting malicious attacks using cyber-security models using deep learning approach
Jain et al. Android Malware: Comprehensive Study and a Cross-Feature Light Weight Proposed Solution
Indumathi et al. Experimental analysis of malware detection and classification system using intelligent deep learning methodology
Shabir et al. A review of hybrid malware detection techniques in Android