Kazi et al., 2019 - Google Patents
Comparing and analysing binary classification algorithms when used to detect the Zeus malwareKazi et al., 2019
View PDF- Document ID
- 3022932296951209240
- Author
- Kazi M
- Woodhead S
- Gan D
- Publication year
- Publication venue
- 2019 Sixth HCT Information Technology Trends (ITT)
External Links
Snippet
The Zeus banking malware is one of the most prolific banking malware variants ever to be discovered. This paper examines and analyses the Support Vector Machine (SVM), Decision Tree and Random Forest machine learning algorithms when used in conjunction …
- 238000007635 classification algorithm 0 title description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kanimozhi et al. | Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing | |
| Ravale et al. | Feature selection based hybrid anomaly intrusion detection system using K means and RBF kernel function | |
| Rashid et al. | Machine and deep learning based comparative analysis using hybrid approaches for intrusion detection system | |
| US11089035B2 (en) | Techniques for predicting subsequent attacks in attack campaigns | |
| Bakhareva et al. | Attack detection in enterprise networks by machine learning methods | |
| Bhatia et al. | A comparative study on various intrusion detection techniques using machine learning and neural network | |
| Baich et al. | Machine Learning for IoT based networks intrusion detection: a comparative study | |
| Rosli et al. | Clustering analysis for malware behavior detection using registry data | |
| Wang | Big Data in intrusion detection systems and intrusion prevention systems | |
| Kaur et al. | Efficient hybrid technique for detecting zero-day polymorphic worms | |
| CN115211075A (en) | Network attack identification in a network environment | |
| KR102454191B1 (en) | The two-stage method for detecting ransomware using dynamic analysis and machine learning | |
| Kaur et al. | A hybrid real-time zero-day attack detection and analysis system | |
| Sidharth | Real-Time Malware Detection Using Machine Learning Algorithms | |
| Ahmed et al. | Ransomware Detection System Based on Machine Learning. | |
| Mitsuhashi et al. | Detection of DGA-based malware communications from DoH traffic using machine learning analysis | |
| Al-Fawa'reh et al. | Detecting malicious DNS queries over encrypted tunnels using statistical analysis and bi-directional recurrent neural networks | |
| Das et al. | Intrusion detection in IoT-Based healthcare using ML and DL approaches: A case study | |
| Lah et al. | Proposed framework for network lateral movement detection based on user risk scoring in siem | |
| Kazi et al. | Comparing the performance of supervised machine learning algorithms when used with a manual feature selection process to detect Zeus malware | |
| Niranjan et al. | Security in data mining-a comprehensive survey | |
| Baniya et al. | Intelligent anomaly detection system based on ensemble and deep learning | |
| Rani et al. | Analysis of machine learning and deep learning intrusion detection system in internet of things network | |
| Kazi et al. | Comparing and analysing binary classification algorithms when used to detect the Zeus malware | |
| Kadam et al. | An enhanced approach for intrusion detection in virtual network of cloud computing |