SoutheastCon 2016 2016
DOI: 10.1109/secon.2016.7506685
|View full text |Cite
|
Sign up to set email alerts
|

Polymorphic malware detection using topological feature extraction with data mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…The PloyTree algorithm consists of two components for classifying the variant of worms by updating the signature tree construction: a signature tree generator and a signature selector. Fraley et al [18] detected polymorphic malware by utilizing topological feature extraction with data mining techniques. Alam et al [19] introduced an Android malware detector system, namely, DroidNative, which analyzes a control-flow pattern to detect malwares in android native code and other variants.…”
Section: A Signature-based Methodsmentioning
confidence: 99%
“…The PloyTree algorithm consists of two components for classifying the variant of worms by updating the signature tree construction: a signature tree generator and a signature selector. Fraley et al [18] detected polymorphic malware by utilizing topological feature extraction with data mining techniques. Alam et al [19] introduced an Android malware detector system, namely, DroidNative, which analyzes a control-flow pattern to detect malwares in android native code and other variants.…”
Section: A Signature-based Methodsmentioning
confidence: 99%
“…Despite the fact that this arrangement has the ability to identify malware in the versatile application, it requires steady overhauling of the predefined signature database. Moreover, it is less effective in identifying noxious exercises utilizing the signature-based technique because of the quickly changing nature of portable malware [24,25]. Signature-based strategies depend in light of exceptional crude byte examples or standard articulations, known as marks, made to coordinate the noxious document.…”
Section: Signature-based Malware Detectionmentioning
confidence: 99%
“…For instance, the authors of [122], [123] have used opcode sequences to detect malware. Similarly work in [129], [130] have used Instruction sequences and application permissions in order to detect malware. Demme et al [124] proposed a novel method to detect malware based on hardware performance counters.…”
Section: A Signature-based Malware Detectionmentioning
confidence: 99%