2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies 2010
DOI: 10.1109/act.2010.33
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
132
2
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 259 publications
(136 citation statements)
references
References 2 publications
1
132
2
1
Order By: Relevance
“…The graph structure, in-degree, out-degree of nodes and root denotes the features of malware activity. As per [31,24], J48 decision trees given better TPR, FPR and accuracy results in comparison with other classifiers. Firdausi et al [24] propounded a malware detection system which monitors the behavior of malicious files in controlled environment using a free online dynamic analysis tool named Anubis.…”
Section: Feature Extraction Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The graph structure, in-degree, out-degree of nodes and root denotes the features of malware activity. As per [31,24], J48 decision trees given better TPR, FPR and accuracy results in comparison with other classifiers. Firdausi et al [24] propounded a malware detection system which monitors the behavior of malicious files in controlled environment using a free online dynamic analysis tool named Anubis.…”
Section: Feature Extraction Methodsmentioning
confidence: 99%
“…As per [31,24], J48 decision trees given better TPR, FPR and accuracy results in comparison with other classifiers. Firdausi et al [24] propounded a malware detection system which monitors the behavior of malicious files in controlled environment using a free online dynamic analysis tool named Anubis. Then the generated results are parsed into vector model for classification on the basis of the trained classifier.…”
Section: Feature Extraction Methodsmentioning
confidence: 99%
“…Often, suspicious software is further analyzed if it shows a similar behavior to already known malware. Machine learning and classification approaches are used for analysis, e.g., Firdausi et al [20] analyzed various classification algorithms for the use in malware analysis, Rieck et al [21] presented an approach based on SVM and Gavrilut et al [22] used the perceptron algorithm for classification.…”
Section: Related Workmentioning
confidence: 99%
“…Firdausi et al [20] and Rieck et al [21] provided a behavior based approach by collecting syscalls and building call graphs of the application. This would be a possible way for security tests if sufficient access to the SUT is available, e.g., during component tests.…”
Section: Related Workmentioning
confidence: 99%
“…Many emulators provide a convenient user interface where the user can specify which characteristics of the file to identify and report. The research methodology in [11] combines the features extracted from dynamic analysis with machine learning (classification) techniques for effective and efficient malware detection.…”
Section: Behavior Based Malware Detectionmentioning
confidence: 99%