2021
DOI: 10.1016/j.cose.2021.102389
|View full text |Cite
|
Sign up to set email alerts
|

Malware detection on windows audit logs using LSTMs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Earning can involve either reselling the software to other users, companies, agencies or trading it on the Dark Web. Profiteering may also consist in constructing the kind of software that enforces, e.g., payments by blocking the user and access to his/her data or by tracking transmitted data, e.g., card numbers and access data to payment systems (Beaman et al, 2021;Formosa et al, 2021;Ring et al, 2021;Skoudis, & Zeltser, 2004).…”
Section: Information Security Threatsmentioning
confidence: 99%
“…Earning can involve either reselling the software to other users, companies, agencies or trading it on the Dark Web. Profiteering may also consist in constructing the kind of software that enforces, e.g., payments by blocking the user and access to his/her data or by tracking transmitted data, e.g., card numbers and access data to payment systems (Beaman et al, 2021;Formosa et al, 2021;Ring et al, 2021;Skoudis, & Zeltser, 2004).…”
Section: Information Security Threatsmentioning
confidence: 99%
“…After the attack computer is connected with the user computer, the data acquisition server, the security detection server and the database server, the attack instruction is sent through the attack computer [17,18]. In order to ensure the rigor of the experiment, this paper joins the traditional vulnerability detection and evaluation system, runs the designed system and the traditional detection and evaluation system on the user's computer respectively, and records the corresponding attack detection data.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…So the improved LogEvent2Vec model by Ryciak et al (2022) uses the fastText algorithm instead of Word2Vec. Ring et al (2021) analyze four different approaches to presenting audit log data: one-hot-ecoding, Word2Vec, fastText, and GloVe. As a result, the study recommends using FastText, which showed the most significant latent space, has the ability to generalize previously unknown values.…”
Section: Semantics Modelsmentioning
confidence: 99%