2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC) 2016
DOI: 10.1109/compsac.2016.151
|View full text |Cite
|
Sign up to set email alerts
|

Malware Detection with Deep Neural Network Using Process Behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
135
0
1

Year Published

2017
2017
2019
2019

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 242 publications
(140 citation statements)
references
References 4 publications
4
135
0
1
Order By: Relevance
“…To align the sequences a warping matrix has been constructed and search for the optimal warping path (red/solid squares) as shown on the right figure with the Sakoe-Chiba Band with width R is used to constrain the warping path. This supports the idea that Dynamic time warping is an algorithm for measuring the similarity of two-time series (Tobiyama et al, 2016). …”
Section: Dynamic Time Warping (Dtw)supporting
confidence: 82%
See 1 more Smart Citation
“…To align the sequences a warping matrix has been constructed and search for the optimal warping path (red/solid squares) as shown on the right figure with the Sakoe-Chiba Band with width R is used to constrain the warping path. This supports the idea that Dynamic time warping is an algorithm for measuring the similarity of two-time series (Tobiyama et al, 2016). …”
Section: Dynamic Time Warping (Dtw)supporting
confidence: 82%
“…The only restriction placed on the data sequences is that they should be sampled at equidistant points in time (this problem can be resolved by re-sampling) (Senin, 2008). The below figure is taken from (Tobiyama et al, 2016) explains more in the concept of DTW. Figure 6 on the left shows the two-time series which are similar but out of phase and has produced a large Euclidean distance.…”
Section: Dynamic Time Warping (Dtw)mentioning
confidence: 99%
“…Second, in the testing phase, obtained predictive model process the properties of unknown data and predict whether it is malware or benign. The popular machine learning techniques among the researchers for the detection of second generation malware are Naive Bayes (Sharma, Sahay, & Kumar, ) (Shabtai, Kanonov, Elovici, Glezer, & Weiss, ), Decision Tree (Sharma & Sahay, ), Data Mining (Santos, Brezo, Ugarte‐Pedrero, & Bringas, ), Neural Networks (Dahl, Stokes, Deng, & Yu, ), Hidden Markov Models (Raghavan, ), Deep Learning (Tobiyama, Yamaguchi, Shimada, Ikuse, & Yagi, ), etc.…”
Section: Applications Of Machine Learning In Cybersecuritymentioning
confidence: 99%
“…For example in [9], time series data from smart grids were analyzed for electricity theft detection, where in such use cases perturbed data can help thieves to avoid being detected. Other crucial decision making systems such as malware detection in smart-phones, leverage temporal data in order to classify if an Android application is malicious or not [5]. Using adversarial attacks, a hacker might generate synthetic data from his/her application allowing it to bypass the security systems and get it installed on the end user's smart-phone.…”
Section: A Deep Learning For Time Series Classificationmentioning
confidence: 99%
“…Time Series Classification (TSC) problems are encountered in various real world data mining tasks ranging from health care [1]- [3] and security [4], [5] to food safety [6], [7] and power consumption monitoring [8], [9]. As deep learning models have revolutionized many machine learning fields such as computer vision [10] and natural language processing [11], [12], researchers recently started to adopt these models for TSC tasks [13].…”
Section: Introductionmentioning
confidence: 99%