[go: up one dir, main page]

de Lima et al., 2021 - Google Patents

Artificial intelligence-based antivirus in order to detect malware preventively

de Lima et al., 2021

View PDF
Document ID
17488243057305108198
Author
de Lima S
Silva H
Luz J
Lima H
Silva S
de Andrade A
da Silva A
Publication year
Publication venue
Progress in Artificial Intelligence

External Links

Snippet

The proposed paper investigates commercial antiviruses. About 17% of the antiviruses did not recognize the existence of the malicious samples analyzed. In order to overcome the limitations of commercial antiviruses, this project creates an antivirus able to identify the …
Continue reading at rsdjournal.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image

Similar Documents

Publication Publication Date Title
Oz et al. A survey on ransomware: Evolution, taxonomy, and defense solutions
US20230409715A1 (en) Methods and systems for trusted unknown malware detection and classification in linux cloud environments
Kharraz et al. Redemption: Real-time protection against ransomware at end-hosts
Rao et al. Advances in Malware Analysis and Detection in Cloud Computing Environments: A Review.
Roseline et al. A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks
Chumachenko Machine learning methods for malware detection and classification
Firdaus et al. Root exploit detection and features optimization: mobile device and blockchain based medical data management
Rani et al. Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art
Patil et al. Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing
Pierazzi et al. A data-driven characterization of modern Android spyware
US10122742B1 (en) Classifying software modules based on comparisons using a neighborhood distance metric
de Lima et al. Artificial intelligence-based antivirus in order to detect malware preventively
Banin et al. Multinomial malware classification via low-level features
Javaheri et al. A novel method for detecting future generations of targeted and metamorphic malware based on genetic algorithm
Muttoo et al. Android malware detection: state of the art
Melvin et al. Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud
Tchakounté et al. LimonDroid: a system coupling three signature-based schemes for profiling Android malware
Batouche et al. A comprehensive approach to android malware detection using machine learning
Pandiaraja et al. A graph-based model for discovering host-based hook attacks
Milosevic et al. Malware threats and solutions for trustworthy mobile systems design
Tanabe et al. Evasive malware via identifier implanting
de Lima et al. Next-generation antivirus for JavaScript malware detection based on dynamic features
Raymond et al. Investigation of Android Malware Using Deep Learning Approach.
Harrison et al. Constructing a cloud-based ids by merging vmi with fma
Shalaginov et al. Automated intelligent multinomial classification of malware species using dynamic behavioural analysis