de Lima et al., 2021 - Google Patents
Artificial intelligence-based antivirus in order to detect malware preventivelyde Lima et al., 2021
View PDF- Document ID
- 17488243057305108198
- Author
- de Lima S
- Silva H
- Luz J
- Lima H
- Silva S
- de Andrade A
- da Silva A
- Publication year
- Publication venue
- Progress in Artificial Intelligence
External Links
Snippet
The proposed paper investigates commercial antiviruses. About 17% of the antiviruses did not recognize the existence of the malicious samples analyzed. In order to overcome the limitations of commercial antiviruses, this project creates an antivirus able to identify the …
- 230000002155 anti-virotic 0 title abstract description 146
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Oz et al. | A survey on ransomware: Evolution, taxonomy, and defense solutions | |
US20230409715A1 (en) | Methods and systems for trusted unknown malware detection and classification in linux cloud environments | |
Kharraz et al. | Redemption: Real-time protection against ransomware at end-hosts | |
Rao et al. | Advances in Malware Analysis and Detection in Cloud Computing Environments: A Review. | |
Roseline et al. | A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks | |
Chumachenko | Machine learning methods for malware detection and classification | |
Firdaus et al. | Root exploit detection and features optimization: mobile device and blockchain based medical data management | |
Rani et al. | Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art | |
Patil et al. | Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing | |
Pierazzi et al. | A data-driven characterization of modern Android spyware | |
US10122742B1 (en) | Classifying software modules based on comparisons using a neighborhood distance metric | |
de Lima et al. | Artificial intelligence-based antivirus in order to detect malware preventively | |
Banin et al. | Multinomial malware classification via low-level features | |
Javaheri et al. | A novel method for detecting future generations of targeted and metamorphic malware based on genetic algorithm | |
Muttoo et al. | Android malware detection: state of the art | |
Melvin et al. | Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud | |
Tchakounté et al. | LimonDroid: a system coupling three signature-based schemes for profiling Android malware | |
Batouche et al. | A comprehensive approach to android malware detection using machine learning | |
Pandiaraja et al. | A graph-based model for discovering host-based hook attacks | |
Milosevic et al. | Malware threats and solutions for trustworthy mobile systems design | |
Tanabe et al. | Evasive malware via identifier implanting | |
de Lima et al. | Next-generation antivirus for JavaScript malware detection based on dynamic features | |
Raymond et al. | Investigation of Android Malware Using Deep Learning Approach. | |
Harrison et al. | Constructing a cloud-based ids by merging vmi with fma | |
Shalaginov et al. | Automated intelligent multinomial classification of malware species using dynamic behavioural analysis |