2020
DOI: 10.1109/access.2020.2966321
|View full text |Cite
|
Sign up to set email alerts
|

MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance

Abstract: Anti-malware tools remain the primary line of defense against malicious software. There is a wide variety of commercial anti-malware tools in the IT security market. However, no single tool is able to provide a full protection against the overwhelming number of daily released malware. Hence, collaboration among malware detection tools is of paramount importance. In this paper, we propose MACoMal, a multiagent based decision mechanism, which assists heterogeneous anti-malware tools to collaborate with each othe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 24 publications
0
10
0
Order By: Relevance
“…The developed n‐gram opcode‐sequence‐based signature model effectively identified anomalous attacks and its variants of the same family. The system was not effective in reducing FPR, which is a major barrier 30 …”
Section: Motivationmentioning
confidence: 95%
“…The developed n‐gram opcode‐sequence‐based signature model effectively identified anomalous attacks and its variants of the same family. The system was not effective in reducing FPR, which is a major barrier 30 …”
Section: Motivationmentioning
confidence: 95%
“…It is based on sharing data and/or resources between nodes and coordinating them in order to improve the security of networks or an entire system [126,160,114]. The collaborative approach proved its effectiveness in detecting vulnerabilities and analyzing security, predicting attacks, and protecting sensitive information, as well as for its ability to address the challenges of traditional security [126,160,16,114].…”
Section: Collaborative Intrusion Detection System (Cids)mentioning
confidence: 99%
“…A significant number of research works is devoted to the issues of ensuring the software integrity, as well as its protection against unauthorized copying and modification. Methods of protection used for Windows OS are researched in work of А. Ільєнко 4 . The review of methods used for the protection of the program code and executable files is presented in work of I. Stepanenko 5 , J. Tevis 6 , L. Van Duong 7 .…”
Section: Introductionmentioning
confidence: 99%