2015
DOI: 10.1007/s10207-015-0297-6
|View full text |Cite
|
Sign up to set email alerts
|

Malware detection using bilayer behavior abstraction and improved one-class support vector machines

Abstract: Malware detection is one of the most challenging problems in computer security. Recently, methods based on machine learning are very popular in unknown and variant malware detection. In order to achieve a successful learning, extracting discriminant and stable features is the most important prerequisite. In this paper, we propose a bilayer behavior abstraction method based on semantic analysis of dynamic API sequences. Operations on sensitive system resources and complex behaviors are abstracted in an interpre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(21 citation statements)
references
References 31 publications
0
21
0
Order By: Relevance
“…In this figure, there are five research that use higher than 5000 real samples during the evaluation process. The BBA approach [44] has the maximum dataset with 17,000 samples and the AMD approach [38] has the minimum dataset with 500 samples.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this figure, there are five research that use higher than 5000 real samples during the evaluation process. The BBA approach [44] has the maximum dataset with 17,000 samples and the AMD approach [38] has the minimum dataset with 500 samples.…”
Section: Discussionmentioning
confidence: 99%
“…The exploratory outcomes illustrate that HDM-Analyzer accomplishes better general exactness and time manysided quality than static and element investigation strategies. Miao et al [44] presented a bilayer conduct reflection strategy in light of the semantic examination of dynamic API sequences. Operations on touchy framework assets and complex practices are disconnected in an interpretable way at various semantic layers.…”
Section: Review Of the Selected Behavior-based Approachesmentioning
confidence: 99%
“…Machine learning and statistical analysis techniques, have the potential to discover unknown and unforeseen attacks, and have been widely used for cyber security research and development [19,27,1,31,17,36,20]. For example, Markel et al [19] developed a machine learning-based detection scheme to learn important patterns from metadata primarily contained in the header of executable files.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Wenke [17] investigated a rule-based approach, utilizing machine learning to conduct intrusion detection. Miao et al [20] developed a bilayer behavior abstraction scheme, based on the semantic analysis of dynamic API (Application Program Interface) sequences, to identify malware that consists of discriminant and stable features.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In [39], with the help of global features using the Gabor wavelet transform and Gist, the feed-forward ANN was developed to identify the behavior of malicious data with a good accuracy. In [40], after abstracting the complex behaviors based on the semantic analysis of dynamic API sequences, an SVM was proposed to achieve malware detection with good generalization ability. Furthermore, with the popular use of the deep learning method, some DNN models were also applied to tackle the issue of malware detection.…”
Section: Introductionmentioning
confidence: 99%