[go: up one dir, main page]

Kavitha et al., 2021 - Google Patents

An extensive review on malware classification based on classifiers

Kavitha et al., 2021

View PDF
Document ID
14242240782668015714
Author
Kavitha P
Muruganantham B
Publication year
Publication venue
Intelligent Computing and Innovation on Data Science: Proceedings of ICTIDS 2021

External Links

Snippet

Any malicious code or program that affects the system or the software program is, in general, described as malware. This malware is usually harmful if not found on the right note. With evolving technologies, this malware tends to grow in different forms as they are created to …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches

Similar Documents

Publication Publication Date Title
Qaisar et al. Multimodal information fusion for android malware detection using lazy learning
Mahindru et al. SOMDROID: Android malware detection by artificial neural network trained using unsupervised learning
Kirubavathi et al. Behavioral based detection of android ransomware using machine learning techniques
Abdessadki et al. A new classification based model for malicious PE files detection
Abid et al. ECMT framework for internet of things: an integrative approach employing in-memory attribute examination and sophisticated neural network architectures in conjunction with hybridized machine learning methodologies
Qaddoura et al. A classification approach based on evolutionary clustering and its application for ransomware detection
Al Ogaili et al. Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm
Jyothish et al. Effectiveness of machine learning based android malware detectors against adversarial attacks
Alqahtani Machine learning techniques for malware detection with challenges and future directions
Tumuluru et al. APMWMM: Approach to Probe Malware on Windows Machine using Machine Learning
Alhashmi et al. Hybrid Malware Variant Detection Model with Extreme Gradient Boosting and Artificial Neural Network Classifiers.
Mahindru et al. Perbdroid: effective malware detection model developed using machine learning classification techniques
Awasthi et al. Phishing Website Prediction: A Comparison of Machine Learning Techniques
Ni et al. FindMal: A file-to-file social network based malware detection framework
Sun et al. MLxPack: Investigating the effects of packers on ML-based Malware detection systems using static and dynamic traits
Karampudi et al. Malware analysis using machine learning
Rathore et al. Android malware detection based on static analysis and data mining techniques: A systematic literature review
Sahoo et al. Evaluation of supervised and unsupervised machine learning classifiers for Mac OS malware detection
Kavitha et al. An extensive review on malware classification based on classifiers
Gupta et al. Deep learning approach for malicious url detection using cnn, rnn, lstm and bi-lstm models
Wael et al. Malicious VBScript detection algorithm based on data-mining techniques
Khan et al. ISAnWin: inductive generalized zero-shot learning using deep CNN for malware detection across windows and android platforms
Li et al. Vulnerability Detection Based on Unified Code Property Graph
Bisoyi et al. An Ensemble technique for imbalanced multiclass malware classification by leveraging API call semantics
Shi et al. Structural classification and similarity measurement of malware