2021 IEEE International Systems Conference (SysCon) 2021
DOI: 10.1109/syscon48628.2021.9447094
|View full text |Cite
|
Sign up to set email alerts
|

Malware System Calls Detection Using Hybrid System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 32 publications
0
9
0
Order By: Relevance
“…Some existing state-of-the-art methods used Application Programming Interface (API) call sequences for ransomware detection and classification using various ML, especially Deep Learning (DL) techniques [138,6,162,52,104]. The extended length of the API call sequences is a challenge because a process may invoke tens of thousands of API calls per second [92,66]. To reduce the amount of data processing time, an approach is to retain only the API call names and ignore the call arguments.…”
Section: Problem Statementmentioning
confidence: 99%
See 4 more Smart Citations
“…Some existing state-of-the-art methods used Application Programming Interface (API) call sequences for ransomware detection and classification using various ML, especially Deep Learning (DL) techniques [138,6,162,52,104]. The extended length of the API call sequences is a challenge because a process may invoke tens of thousands of API calls per second [92,66]. To reduce the amount of data processing time, an approach is to retain only the API call names and ignore the call arguments.…”
Section: Problem Statementmentioning
confidence: 99%
“…Behavior-based detection uses the system or API calls invoked by malware and collected through malware dynamic analysis [269]. A malware's behavior may span the activities of multiple processes, where a single process can invoke tens of thousands of API calls per second, resulting in huge behavior logs per sample [92,66], which generates the problem of data high-dimensionality. For example, Sgandurra et al [223] created 30,967 features categorized into seven groups using API call names, call arguments and ASCII strings extracted through dynamic analysis of ransomware and good-ware.…”
Section: Data High-dimensionalitymentioning
confidence: 99%
See 3 more Smart Citations