DOI: 10.31979/etd.43jb-raq4
|View full text |Cite
|
Sign up to set email alerts
|

Support Vector Machines and Metamorphic Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…In [49], Hidden Markov Models are used to effectively classify metamorphic malware, based on extracted opcode sequences. A similar analysis involving Profile Hidden Markov Models is considered in [4], while Principal Component Analysis is used in [26] and [16], and Support Vector Machines are used for malware detection in [40]. The paper [3] employs clustering, based on features derived from static analysis, for malware classification.…”
Section: Static Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In [49], Hidden Markov Models are used to effectively classify metamorphic malware, based on extracted opcode sequences. A similar analysis involving Profile Hidden Markov Models is considered in [4], while Principal Component Analysis is used in [26] and [16], and Support Vector Machines are used for malware detection in [40]. The paper [3] employs clustering, based on features derived from static analysis, for malware classification.…”
Section: Static Analysismentioning
confidence: 99%
“…A wide array of advanced detection techniques have been considered in the literature. Some detection techniques rely only on static analysis [3,4,6,11,15,16,26,38,39,40,42], that is, features that can be obtained without executing the software. In addition, dynamic analysis has been successfully applied to the malware detection problem [1,2,12,19,21,27,30,31,32,33,50].…”
Section: Introductionmentioning
confidence: 99%
“…Their work was improved upon by the use of n-grams of byte codes as features of the classifier [10]. The researcher in [11] utilized opcode sequence with support vector machine algorithm to identify malicious executables. The Application Programming Interface (API) sequence in the code was used in detecting malware and proved to be effective and faster as compared to assembly analysis [12].…”
Section: A Static Analysis Techniquementioning
confidence: 99%