2018
DOI: 10.1016/j.cose.2018.05.010
|View full text |Cite
|
Sign up to set email alerts
|

Early-stage malware prediction using recurrent neural networks

Abstract: Static malware analysis is well-suited to endpoint anti-virus systems as it can be conducted quickly by examining the features of an executable piece of code and matching it to previously observed malicious code. However, static code analysis can be vulnerable to code obfuscation techniques. Behavioural data collected during file execution is more difficult to obfuscate, but takes a relatively long time to capture -typically up to 5 minutes, meaning the malicious payload has likely already been delivered by th… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
164
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 233 publications
(166 citation statements)
references
References 26 publications
1
164
0
1
Order By: Relevance
“…However, dynamic analysis approaches are also imperfect. It is reported in [3,[5][6][7][8][9] that smart malware can detect whether it runs on a virtual or real environment. Moreover, smart malware can modify their behavior by hiding their malicious code to avoid detection.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, dynamic analysis approaches are also imperfect. It is reported in [3,[5][6][7][8][9] that smart malware can detect whether it runs on a virtual or real environment. Moreover, smart malware can modify their behavior by hiding their malicious code to avoid detection.…”
Section: Related Workmentioning
confidence: 99%
“…However, non-signature based approaches can be vulnerable to false positives or false negatives results. Technically, it identifies normal benign files as malware and incapable to detect malware in the latter case [5][6][7]. However, it totally avoids the attack window time.…”
Section: Introductionmentioning
confidence: 99%
“…Then, we use the method CG to solve the weighted least squares problem (20). The major work of the online algorithm KMCCG lies in the update of the Gram matrix G M and the coefficient vector η M .…”
Section: Kernel Mixture Correntropy Conjugate Gradient Algorithmmentioning
confidence: 99%
“…With the rapid advancement of Internet technology [19], the issue of network security imposes huge challenges to the Internet. Specifically, the demand for malware analysis has become increasingly urgent, and practitioners and researchers have been making progress in the field of malware prediction and detection [20]. Usually, malware is able to implement intention by calling the existing application programming interface (API) in the system.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, behavioral modeling with recurrent neural networks can be applied in various tasks, e.g. identifying behavior of malware files [23], and binding the approach to users' profiles is a restriction. As it was mentioned by Sommer and Paxson [1] understanding of the exact system and types of interactions is very critical in cybersecurity tasks.…”
Section: Related Workmentioning
confidence: 99%