2016 IEEE Global Communications Conference (GLOBECOM) 2016
DOI: 10.1109/glocom.2016.7841778
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
41
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 67 publications
(41 citation statements)
references
References 13 publications
0
41
0
Order By: Relevance
“…The core concept is only to record dynamic data if it will improve accuracy, either by omitting some files from dynamic data collection or by stopping data collection early. Shibahara et al [16] decide when to stop analysis for each sample based on changes in network communication, reducing the total time taken by 67% compared with a "conventional" method that analyses samples for 15 minutes each. Neugschwandtner et al [17] used static data to determine dissimilarity to known malware variants using a clustering algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…The core concept is only to record dynamic data if it will improve accuracy, either by omitting some files from dynamic data collection or by stopping data collection early. Shibahara et al [16] decide when to stop analysis for each sample based on changes in network communication, reducing the total time taken by 67% compared with a "conventional" method that analyses samples for 15 minutes each. Neugschwandtner et al [17] used static data to determine dissimilarity to known malware variants using a clustering algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…Real-time processing: Most existing deep learning based security schemes such as the DNN-based authentication in [4] and the RNN-based malware detection in [11] require long training time and are too complicated to be implemented in the practical MCS systems for real-time processing. The widely used hardware for deep learning computation such as graphics processing units (GPUs), is not applicable for most mobile devices such as smartphones in MCS systems.…”
Section: Discussionmentioning
confidence: 99%
“…A RNN-based malware detection scheme as developed in [11] uses RNN to capture the domain and content-based malware characteristics and determine whether to suspend the dynamic detection based on the network behavior. As shown in Fig.…”
Section: Dl-based Intrusion Detectionmentioning
confidence: 99%
“…Shibahara et al [38] proposed a slightly different algorithm that is using RNN on changes in network communication with a goal of reducing malware analysis time. This approach is not DGAonly specific but rather generic and attempts to cover other types of malware.…”
Section: Related Workmentioning
confidence: 99%