2020
DOI: 10.1007/978-3-030-59635-4_5
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

3
6

Authors

Journals

citations
Cited by 36 publications
(25 citation statements)
references
References 26 publications
0
25
0
Order By: Relevance
“…In future research, there are requirements to conduct interviews of health practitioners to understand the security and privacy concerns while developing the smart hospital, and need to apply similar approach involving community residents, infrastructure developers and stakeholders to develop other components of the smart connected ecosystem. Privacy preserving deep learning [117] , [118] approaches such as collaborative deep learning or federated learning also need to be explored to train and deploy local models at the edge devices. A Blockchain-based secure DL [119] that combines DL and Blockchain to support secure collaborative DL in IoT.…”
Section: Open Challenges and Future Directionsmentioning
confidence: 99%
“…In future research, there are requirements to conduct interviews of health practitioners to understand the security and privacy concerns while developing the smart hospital, and need to apply similar approach involving community residents, infrastructure developers and stakeholders to develop other components of the smart connected ecosystem. Privacy preserving deep learning [117] , [118] approaches such as collaborative deep learning or federated learning also need to be explored to train and deploy local models at the edge devices. A Blockchain-based secure DL [119] that combines DL and Blockchain to support secure collaborative DL in IoT.…”
Section: Open Challenges and Future Directionsmentioning
confidence: 99%
“…Beside the works that used traditional ML algorithms, others [13], [9], [32], [33] focused on using deep learning algorithms for online malware detection. The authors in [13] extended their work in [30] and introduced a detection method which uses a CNN model with the goal of identifying low profile malware.…”
Section: B Online Malware Detectionmentioning
confidence: 99%
“…One limitation of this work is that the authors used a shallow CNN model and didn't provide an analysis on using various CNN models. In this regards, McDole et al [32] provided a baseline analysis of using stateof-the-art CNN models including multiple ResNet [34] and DenseNet [35] models. We extend this work by providing an analysis on employing RNN.…”
Section: B Online Malware Detectionmentioning
confidence: 99%
“…• Network features [6], [22]: such approaches rely on using network features to detect malicious traffic patterns; • System calls [3], [7], [29], [38]: approaches relying on system calls to detect particular sequences of system calls that generally used by malware; • Memory features [25], [39]: approaches using features like malicious memory access patterns to detect malware; • Hardware performance counters [5], [8]: approaches with performance counters (e.g., cache hit/miss) that detect malware; • Performance metrics [2], [18], [36], [37]: approaches using system metrics like CPU or memory utilization to model normal and malicious application behavior. We use performance metrics data and focus on features that can easily be obtained by a light-weight, on-host agent.…”
Section: A Malware Behavior Datamentioning
confidence: 99%