AliAhmad et al., 2023 - Google Patents
Malware detection issues, future trends and challenges: a surveyAliAhmad et al., 2023
View PDF- Document ID
- 13187854573711132380
- Author
- AliAhmad A
- Eleyan D
- Eleyan A
- Bejaoui T
- Zolkipli M
- Al-Khalidi M
- Publication year
- Publication venue
- 2023 International Symposium on Networks, Computers and Communications (ISNCC)
External Links
Snippet
This paper focuses on the challenges and issues of detecting malware in to-day's world where cyberattacks continue to grow in number and complexity. The paper reviews current trends and technologies in malware detection and the limitations of existing detection …
- 238000001514 detection method 0 title abstract description 60
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30873—Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/30707—Clustering or classification into predefined classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30899—Browsing optimisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30994—Browsing or visualization
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Polamarasetti | Research developments, trends and challenges on the rise of machine learning for detection and classification of malware | |
Rani et al. | Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art | |
Laurenza et al. | Malware triage for early identification of advanced persistent threat activities | |
AliAhmad et al. | Malware detection issues, future trends and challenges: a survey | |
US20240241956A1 (en) | Classifying cybersecurity threats using machine learning on non-euclidean data | |
Mohamed et al. | Detecting malicious android applications based on API calls and permissions using machine learning algorithms | |
Mohaisen et al. | Network-based analysis and classification of malware using behavioral artifacts ordering | |
Howard et al. | pSigene: Webcrawling to generalize SQL injection signatures | |
Alghamdi et al. | Detect keyloggers by using machine learning | |
Waheed et al. | Evolving trees for detecting android malware using evolutionary learning | |
Kumar et al. | IOT malware detection using static and dynamic analysis techniques: A systematic literature review | |
Weshahi et al. | IoT-Enhanced Malicious URL Detection Using Machine Learning | |
Ponnuru et al. | A malware classification survey on adversarial attacks and defences | |
Ferdous et al. | Malware resistant data protection in hyper-connected networks: A survey | |
Aledam et al. | Enhanced Malware Detection for Mobile Operating Systems Using Machine Learning and Dynamic Analysis. | |
Ngirande et al. | Detection and Analysis of Android Ransomware Using the Support Vector Machines | |
Shehata et al. | Comparative Study for Andriod Mobile Static Analysis Algorithms | |
Vijay et al. | Android-based smartphone malware exploit prevention using a machine learning-based runtime detection system | |
Yuksel et al. | A machine learning approach to malware detection using application programming interface calls (MDAPI) | |
Maniriho et al. | Evaluation and survey of state of the art malware detection and classification techniques: Analysis and recommendation | |
Abduraimova et al. | Comparative study of machine learning applications in malware forensics | |
Alamyar | Detecting malicious attacks using cyber-security models using deep learning approach | |
Jain et al. | Android Malware: Comprehensive Study and a Cross-Feature Light Weight Proposed Solution | |
Indumathi et al. | Experimental analysis of malware detection and classification system using intelligent deep learning methodology | |
Shabir et al. | A review of hybrid malware detection techniques in Android |