2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium 2015
DOI: 10.1109/hpcc-css-icess.2015.297
|View full text |Cite
|
Sign up to set email alerts
|

Prison: Tracking Process Interactions to Contain Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…System-wide frequency feature vector As we mentioned before, our learning models make use of system calls from all processes running in the system. Our hypothesis is that such holistic (opposite to process-specific) approach will prove more effective for malware detection than current approaches, since modern malware perform interactions among multi-ple processes in the system to accomplish malicious behaviors [43], [44]. System-wide information helps the models learn the interactions among all processes running on the system.…”
Section: ) Reconstruction Modulementioning
confidence: 99%
“…System-wide frequency feature vector As we mentioned before, our learning models make use of system calls from all processes running in the system. Our hypothesis is that such holistic (opposite to process-specific) approach will prove more effective for malware detection than current approaches, since modern malware perform interactions among multi-ple processes in the system to accomplish malicious behaviors [43], [44]. System-wide information helps the models learn the interactions among all processes running on the system.…”
Section: ) Reconstruction Modulementioning
confidence: 99%