2022
DOI: 10.1007/978-981-19-3035-5_41
|View full text |Cite
|
Sign up to set email alerts
|

The Application of Cyclostationary Malware Detection Using Boruta and PCA

Abstract: Cyclostationarity involves periodic statistical variations in signals and processes, commonly used in signal analysis and network security. In the context of attacks, cyclostationarity helps detect malicious behaviors within network traffic, such as traffic patterns in Distributed Denial of Service (DDoS) attacks or hidden communication channels in malware. This approach enhances security by identifying abnormal patterns and informing Network Intrusion Detection Systems (NIDSs) to recognize potential attacks, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…While Poudyal et al [8] focuses on code-level analysis, the proposed RFSA stands out for its specialized feature selection approach which showcases superior performance and comprehensive insights into ransomware dynamics within cryptocurrency ecosystems. Zahoora et al [10] present a Cost-Sensitive Pareto Ensemble strategy (CSPE-R) to address the critical challenge posed by zero-day ransomware attacks [11]. They emphasized the transformation of feature spaces using an unsupervised deep Contractive Auto Encoder (CAE) model.…”
Section: Related Workmentioning
confidence: 99%
“…While Poudyal et al [8] focuses on code-level analysis, the proposed RFSA stands out for its specialized feature selection approach which showcases superior performance and comprehensive insights into ransomware dynamics within cryptocurrency ecosystems. Zahoora et al [10] present a Cost-Sensitive Pareto Ensemble strategy (CSPE-R) to address the critical challenge posed by zero-day ransomware attacks [11]. They emphasized the transformation of feature spaces using an unsupervised deep Contractive Auto Encoder (CAE) model.…”
Section: Related Workmentioning
confidence: 99%
“…To address this limitation, our study uses the UGRansome dataset, a publicly accessible dataset created in [9]. This dataset was specifically designed to classify and understand ransomware [10][11][12][13]. In the age of big data, one crucial aspect of modern data analysis and machine learning implementation is the extraction of meaningful and representative features from complex or high-dimensional datasets [9,14].…”
Section: Notpetyamentioning
confidence: 99%
“…Precision assesses the accuracy of positive predictions among the instances that are predicted as positive [12]. It is defined as in (13):…”
Section: Performance Evaluationmentioning
confidence: 99%
“…In the experiments, precision (P), accuracy (A), F1 score (F), and recall (R) [52,53] are used as evaluation metrics. Precision represents the number of true predicted classes that belong to the accurate class.…”
Section: Evaluation Metricsmentioning
confidence: 99%