[go: up one dir, main page]

Kazi et al., 2019 - Google Patents

Comparing and analysing binary classification algorithms when used to detect the Zeus malware

Kazi et al., 2019

View PDF
Document ID
3022932296951209240
Author
Kazi M
Woodhead S
Gan D
Publication year
Publication venue
2019 Sixth HCT Information Technology Trends (ITT)

External Links

Snippet

The Zeus banking malware is one of the most prolific banking malware variants ever to be discovered. This paper examines and analyses the Support Vector Machine (SVM), Decision Tree and Random Forest machine learning algorithms when used in conjunction …
Continue reading at gala.gre.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes

Similar Documents

Publication Publication Date Title
Kanimozhi et al. Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing
Ravale et al. Feature selection based hybrid anomaly intrusion detection system using K means and RBF kernel function
Rashid et al. Machine and deep learning based comparative analysis using hybrid approaches for intrusion detection system
US11089035B2 (en) Techniques for predicting subsequent attacks in attack campaigns
Bakhareva et al. Attack detection in enterprise networks by machine learning methods
Bhatia et al. A comparative study on various intrusion detection techniques using machine learning and neural network
Baich et al. Machine Learning for IoT based networks intrusion detection: a comparative study
Rosli et al. Clustering analysis for malware behavior detection using registry data
Wang Big Data in intrusion detection systems and intrusion prevention systems
Kaur et al. Efficient hybrid technique for detecting zero-day polymorphic worms
CN115211075A (en) Network attack identification in a network environment
KR102454191B1 (en) The two-stage method for detecting ransomware using dynamic analysis and machine learning
Kaur et al. A hybrid real-time zero-day attack detection and analysis system
Sidharth Real-Time Malware Detection Using Machine Learning Algorithms
Ahmed et al. Ransomware Detection System Based on Machine Learning.
Mitsuhashi et al. Detection of DGA-based malware communications from DoH traffic using machine learning analysis
Al-Fawa'reh et al. Detecting malicious DNS queries over encrypted tunnels using statistical analysis and bi-directional recurrent neural networks
Das et al. Intrusion detection in IoT-Based healthcare using ML and DL approaches: A case study
Lah et al. Proposed framework for network lateral movement detection based on user risk scoring in siem
Kazi et al. Comparing the performance of supervised machine learning algorithms when used with a manual feature selection process to detect Zeus malware
Niranjan et al. Security in data mining-a comprehensive survey
Baniya et al. Intelligent anomaly detection system based on ensemble and deep learning
Rani et al. Analysis of machine learning and deep learning intrusion detection system in internet of things network
Kazi et al. Comparing and analysing binary classification algorithms when used to detect the Zeus malware
Kadam et al. An enhanced approach for intrusion detection in virtual network of cloud computing