Poudyal, 2021 - Google Patents
Multi-level analysis of Malware using Machine LearningPoudyal, 2021
View PDF- Document ID
- 338502119587093568
- Author
- Poudyal S
- Publication year
External Links
Snippet
Malware analysis and detection is a critical capability every business and organization needs to defend itself against a growing number of cyber threats. For example, ransomware, an advanced form of malware, makes hostage of user's data and asks ransom, usually in …
- 238000004458 analytical method 0 title abstract description 159
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Moussaileb et al. | A survey on windows-based ransomware taxonomy and detection mechanisms | |
| Poudyal et al. | A framework for analyzing ransomware using machine learning | |
| Poudyal et al. | Analysis of crypto-ransomware using ML-based multi-level profiling | |
| Ongun et al. | Living-off-the-land command detection using active learning | |
| Chumachenko | Machine learning methods for malware detection and classification | |
| Bazrafshan et al. | A survey on heuristic malware detection techniques | |
| KR102160659B1 (en) | Detection of anomalous program execution using hardware-based micro-architectural data | |
| Ahmed et al. | Automated analysis approach for the detection of high survivable ransomware | |
| Ferdous et al. | AI-based ransomware detection: A comprehensive review | |
| Wang et al. | Detecting worms via mining dynamic program execution | |
| Siddiqui | Data mining methods for malware detection | |
| Aslan et al. | Using a subtractive center behavioral model to detect malware | |
| Akhtar | Malware detection and analysis: Challenges and research opportunities | |
| AL-Maliki et al. | Review of SQL injection attacks: Detection, to enhance the security of the website from client-side attacks | |
| Eskandari et al. | To incorporate sequential dynamic features in malware detection engines | |
| Azad et al. | DEEPSEL: A novel feature selection for early identification of malware in mobile applications | |
| Cui et al. | Api2vec++: Boosting api sequence representation for malware detection and classification | |
| Hussain et al. | Deep learning based hybrid analysis of malware detection and classification: a recent review | |
| Alazab et al. | Detecting malicious behaviour using supervised learning algorithms of the function calls | |
| Sharif et al. | Drsec: Flexible distributed representations for efficient endpoint security | |
| Sukul et al. | Automated dynamic detection of ransomware using augmented bootstrapping | |
| Ezeonwu et al. | Comparative analysis of machine learning classifiers for fileless malware detection | |
| Poudyal | Multi-level analysis of Malware using Machine Learning | |
| Nugraha et al. | Malware classification using machine learning algorithm | |
| Fernando | Fesad: Ransomware detection with machine learning using adaption to concept drift |