2017 12th International Conference on Malicious and Unwanted Software (MALWARE) 2017
DOI: 10.1109/malware.2017.8323956
|View full text |Cite
|
Sign up to set email alerts
|

Behavioral anomaly detection of malware on home routers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 13 publications
0
18
0
Order By: Relevance
“…Kim et al [20] used an unsupervised AutoEncoder (AE) to detect unknown attacks in a single event. Some studies detect abnormal behavior of malicious code using principal component analysis, similar to AE [21]. Zenati et al [22] provided a promising approach to solving the data imbalance problem by modeling real data into complex high-dimensional distributions using Generative Adversarial Network (GAN).…”
Section: A Anomaly Detection Researchmentioning
confidence: 99%
“…Kim et al [20] used an unsupervised AutoEncoder (AE) to detect unknown attacks in a single event. Some studies detect abnormal behavior of malicious code using principal component analysis, similar to AE [21]. Zenati et al [22] provided a promising approach to solving the data imbalance problem by modeling real data into complex high-dimensional distributions using Generative Adversarial Network (GAN).…”
Section: A Anomaly Detection Researchmentioning
confidence: 99%
“…Other works such as [20,23] aim to build anomaly-based systems to detect IoT botnets. These works present techniques that model the legitimate behaviour of IoT devices.…”
Section: Related Workmentioning
confidence: 99%
“…Despite the great results, the use of deep autoencoders can be computationally costly even to a gateway and demands large amounts of data to train the model. The work proposed by [23] explores the construction of an IDS to protect Linux routers, a very popular target in recent years. They tested three different types of anomaly detection techniques, PCA, OSVM, and a naive detector using n-grams, to analyse syscall data from routers.…”
Section: Related Workmentioning
confidence: 99%
“…We preferred an approach that allows generalization and comparatively fast prediction-one class support vector machine (OC-SVM) [26]. OC-SVMs are widely used for anomaly detection and were also applied for intrusion detection [16,27]. We employ them only for detecting the corresponding cluster for a new session.…”
Section: Related Workmentioning
confidence: 99%