Kavitha et al., 2021 - Google Patents
An extensive review on malware classification based on classifiersKavitha et al., 2021
View PDF- Document ID
- 14242240782668015714
- Author
- Kavitha P
- Muruganantham B
- Publication year
- Publication venue
- Intelligent Computing and Innovation on Data Science: Proceedings of ICTIDS 2021
External Links
Snippet
Any malicious code or program that affects the system or the software program is, in general, described as malware. This malware is usually harmful if not found on the right note. With evolving technologies, this malware tends to grow in different forms as they are created to …
- 238000004422 calculation algorithm 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Qaisar et al. | Multimodal information fusion for android malware detection using lazy learning | |
Mahindru et al. | SOMDROID: Android malware detection by artificial neural network trained using unsupervised learning | |
Kirubavathi et al. | Behavioral based detection of android ransomware using machine learning techniques | |
Abdessadki et al. | A new classification based model for malicious PE files detection | |
Abid et al. | ECMT framework for internet of things: an integrative approach employing in-memory attribute examination and sophisticated neural network architectures in conjunction with hybridized machine learning methodologies | |
Qaddoura et al. | A classification approach based on evolutionary clustering and its application for ransomware detection | |
Al Ogaili et al. | Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm | |
Jyothish et al. | Effectiveness of machine learning based android malware detectors against adversarial attacks | |
Alqahtani | Machine learning techniques for malware detection with challenges and future directions | |
Tumuluru et al. | APMWMM: Approach to Probe Malware on Windows Machine using Machine Learning | |
Alhashmi et al. | Hybrid Malware Variant Detection Model with Extreme Gradient Boosting and Artificial Neural Network Classifiers. | |
Mahindru et al. | Perbdroid: effective malware detection model developed using machine learning classification techniques | |
Awasthi et al. | Phishing Website Prediction: A Comparison of Machine Learning Techniques | |
Ni et al. | FindMal: A file-to-file social network based malware detection framework | |
Sun et al. | MLxPack: Investigating the effects of packers on ML-based Malware detection systems using static and dynamic traits | |
Karampudi et al. | Malware analysis using machine learning | |
Rathore et al. | Android malware detection based on static analysis and data mining techniques: A systematic literature review | |
Sahoo et al. | Evaluation of supervised and unsupervised machine learning classifiers for Mac OS malware detection | |
Kavitha et al. | An extensive review on malware classification based on classifiers | |
Gupta et al. | Deep learning approach for malicious url detection using cnn, rnn, lstm and bi-lstm models | |
Wael et al. | Malicious VBScript detection algorithm based on data-mining techniques | |
Khan et al. | ISAnWin: inductive generalized zero-shot learning using deep CNN for malware detection across windows and android platforms | |
Li et al. | Vulnerability Detection Based on Unified Code Property Graph | |
Bisoyi et al. | An Ensemble technique for imbalanced multiclass malware classification by leveraging API call semantics | |
Shi et al. | Structural classification and similarity measurement of malware |