2017 2nd International Conference on Telecommunication and Networks (TEL-NET) 2017
DOI: 10.1109/tel-net.2017.8343554
|View full text |Cite
|
Sign up to set email alerts
|

Integrated Malware analysis using machine learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…Jain and Singh 4 proposed a hybrid approach by extracting features from the static and dynamic analysis techniques. In this both SVM and NB algorithms were used to identify malicious websites.…”
Section: Literature Surveymentioning
confidence: 99%
“…Jain and Singh 4 proposed a hybrid approach by extracting features from the static and dynamic analysis techniques. In this both SVM and NB algorithms were used to identify malicious websites.…”
Section: Literature Surveymentioning
confidence: 99%
“…Other works relied on NORIBEN sandboxing, like in [ 8 ], where the authors proposed a solution to increase the speed and improve capacity of malware classification by extracting integrated features organized in an Excel format, then converted to CSV format, via static and dynamic analysis using antianalysis techniques through the static stage to extract feature vectors from models: Anti-VM, Anti-Debugging, Suspicious URL Analysis, Packet Analysis, and String extraction. Next is the dynamic phase in which APIs and function calls are extracted from a CSV file that is compatible with Weka using the NORIBEN sandboxing tool.…”
Section: Related Workmentioning
confidence: 99%
“…Others used only static features to detect malware and we believe relying only on the static features will not enable the trained model to capture the dynamic behavior of the malware, especially when considering the design and nature of Zero-Day malware, like [ 12 , 13 , 25 ]. Moreover, some studies evaluated many ML models with both static and dynamic features but showed low accuracy, such as [ 8 , 16 , 20 , 24 ]. Therefore, as a motive, we propose evaluating several ML models for malware detection considering enough samples for both training and testing phases, involving both static and dynamic features, providing a sort of taxonomy on the studies and dataset used for tackling malware detection using ML techniques.…”
Section: Proposed Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Akash Kumar et al 16 came with integrated malware analysis of zero‐day malware using machine learning techniques. They focused on four areas for zero‐day malware—anti‐VM, anti‐debugging, obfuscation, and packing.…”
Section: Related Workmentioning
confidence: 99%