2019
DOI: 10.1016/j.cogsys.2019.03.007
|View full text |Cite
|
Sign up to set email alerts
|

Metamorphic malicious code behavior detection using probabilistic inference methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…Heuristic-based detection approach can use both static and dynamic features such as API calls, Opcode, CFG, n-gram, list of DLLs, and hybrid features. It can detect some previously unknown malware, but it is vulnerable to metamorphic techniques, and numerous rules and training phases [107] make this detection approach complicated (Table 7). Decreasing the number of rules, and building a more efficient learning phase can improve the method performance.…”
Section: Evaluation On Malware Detection Approachesmentioning
confidence: 99%
“…Heuristic-based detection approach can use both static and dynamic features such as API calls, Opcode, CFG, n-gram, list of DLLs, and hybrid features. It can detect some previously unknown malware, but it is vulnerable to metamorphic techniques, and numerous rules and training phases [107] make this detection approach complicated (Table 7). Decreasing the number of rules, and building a more efficient learning phase can improve the method performance.…”
Section: Evaluation On Malware Detection Approachesmentioning
confidence: 99%
“…Recent works on malware behaviors are represented in [19,[29][30][31]. Lightweight behavioral malware detection for windows platforms is explained in [29].…”
Section: Related Workmentioning
confidence: 99%
“…According to the authors, test results are promising especially TPR and FPR for practical malware detection. Choi et al proposed metamorphic malicious code behavior detection using probabilistic inference methods [30]. It used FP-growth and Markov logic networks algorithm to detect metamorphic malware.…”
Section: Papermentioning
confidence: 99%
“…API call sequence can provide considerable information about the behavioral features of malware. Most of the researchers conducted their study by using API calls to analyze behaviorbased malware [9][10][11][12]. One benefit of having the ability to classify the type of malware from a malicious program's system call behavior is to more quickly attribute a source and better understand the effects of a piece of malware.…”
Section: Introductionmentioning
confidence: 99%