2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns 2009
DOI: 10.1109/computationworld.2009.85
|View full text |Cite
|
Sign up to set email alerts
|

Malware Detection Using Perceptrons and Support Vector Machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…The layer-based attack and the attempt by an adversary to attack through a communication protocol stack is shown in Table 1. [26]. A series of methodologies were proposed to overcome this type of application layer attacks, IBM research group proposed n-grams method and this method was improved by using multiple machine learning algorithms [27].…”
Section: Discussion and Analysismentioning
confidence: 99%
“…The layer-based attack and the attempt by an adversary to attack through a communication protocol stack is shown in Table 1. [26]. A series of methodologies were proposed to overcome this type of application layer attacks, IBM research group proposed n-grams method and this method was improved by using multiple machine learning algorithms [27].…”
Section: Discussion and Analysismentioning
confidence: 99%
“…This paper is an extended version of the conference papers Touili, 2018, 2016). Schultz et al (2001), Kolter and Maloof (2004), Gavrilut et al (2009), Tahan et al (2012) and Khammas et al (2015) apply machine learning techniques for malware classification. All these works use either a vector of bits (Schultz et al, 2001;Gavrilut et al, 2009) or n-grams (Kolter and Maloof, 2004;Tahan et al, 2012;Khammas et al, 2015) to represent a program.…”
Section: Representation Of Malicious Behavioursmentioning
confidence: 99%
“…Schultz et al (2001), Kolter and Maloof (2004), Gavrilut et al (2009), Tahan et al (2012) and Khammas et al (2015) apply machine learning techniques for malware classification. All these works use either a vector of bits (Schultz et al, 2001;Gavrilut et al, 2009) or n-grams (Kolter and Maloof, 2004;Tahan et al, 2012;Khammas et al, 2015) to represent a program. Such vector models allow to record some chosen information from the program, they do not represent the program's behaviours.…”
Section: Representation Of Malicious Behavioursmentioning
confidence: 99%
“…Machine learning (ML) is among the innovative technologies that have been employed towards that direction. Many works have focused on building frameworks for analysis [7], [20], [26], acquiring static features [15], [38] and classifying malware families [21], [28], [30]. A system relying on ML to detect an unknown malicious payload, without the need for removing obfuscation, was presented in [20]; text classification methods were shown to improve the detection accuracy of obfuscated samples.…”
Section: Related Workmentioning
confidence: 99%