2022
DOI: 10.1155/2022/5852412
|View full text |Cite|
|
Sign up to set email alerts
|

Analysis of Malware Detection and Signature Generation Using a Novel Hybrid Approach

Abstract: In recent years, malware detection has become necessary to improve system performance and prevent programs from infecting your computer. Signature-based malware failed to detect most new organisms. This article presents the hybrid technique to automatically generate and classify malicious signatures. The hybrid method is called the ANFIS-SSA approach. The hybrid system includes the Adaptive Neuro Fuzzy Interference System (ANFIS) and the Salp Swarm Optimization (SSA). Based on this observation, we propose a hy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…RFID provides early information on RFID-related objects and enables improved and updated process information on the links with the RFID solution. e number of errors could be reduced further through better information about objects in health processes [1], [2][3][4][5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…RFID provides early information on RFID-related objects and enables improved and updated process information on the links with the RFID solution. e number of errors could be reduced further through better information about objects in health processes [1], [2][3][4][5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…D-Quark algorithm. (i) Input: param, r′′, s′, C′ Output: signature, whether valid or invalid(1) User B computers R � θ(r '' )mod n (2) Calculate ω � (s′) − 1 mod n (3) u 1 � H(D(C′))mod n and u 2 � Rmod n (4) Calculate V � ω * [u 1 * D + u 2 * PU a ] (5) If V � � r′′, in that case, the signature is valid; if not, it's not validALGORITHM 4: Algorithm for verifying signature identity. (i) An algorithm for encrypting HEC RFID system (ii) Input: param, PR a , m, PU b Output: C (1) Compute Y � PR a .PU b (2) Return C � m + Y { } Encryption algorithm.…”
mentioning
confidence: 99%
“…Modern malware, with its ability to mimic benign behavior or effectively conceal its malicious activities, often eludes the heuristic analysis. This limitation is primarily due to the heuristic methods' reliance on predefined behavioral rules and patterns, which may not encompass the innovative tactics employed by new malware strains (Dugyala et al 2022).…”
Section: Review On Detection Approaches Of Obfuscated Malware In Memo...mentioning
confidence: 99%
“…These signatures bear the indicators of compromise inside their code, digital footsteps, or signatures. Technical indicators are identified; for example, to determine whether that file is maliciousfile name, hash values, strings like Internet Protocol (IP) addresses, domains, and file header data can be used [8].…”
Section: Figure 1 Types Of Malware Analysismentioning
confidence: 99%
“…• Binary Cross-Entropy (BCE) Loss: As shown in equation (8), it is calculated as the negative log-likelihood of the predicted probability distribution over the binary labels, given the true labels. It measures the difference between the predicted probability distribution and the actual probability distribution of the binary labels and penalizes the model more heavily for larger deviations.…”
Section: (5)mentioning
confidence: 99%