Systems and methods for detecting malware based on event dependencies

作者: Reuben Feinman , Jugal Parikh

DOI:

关键词: Event sequenceEvent (probability theory)MalwareConfidence scoreData miningComputer science

摘要: The disclosed computer-implemented method for detecting malware based on event dependencies may include (1) applying, to a detection system capable of analyzing dependencies, an sequence derived from the execution application, (2) obtaining, system, confidence score which calculates after certain within has executed at least in part one or more between and other sequence, (3) determining that exceeds threshold, (4) classifying application as malicious response threshold. Various methods, systems, computer-readable media are also disclosed.

参考文章(15)
Brigham Sterling Anderson, Luke Robert Gutzwiller, Megan Ursula Hazen, Tom Abeles, David Russell Williams, Alan McIntyre, Classifying data with deep learning neural records incrementally refined through expert input ,(2015)
Engin Kirda, Paolo Milani Comparetti, Christopher Kruegel, Clemens Kolbitsch, Xiaoyong Zhou, XiaoFeng Wang, Effective and efficient malware detection at the end host usenix security symposium. pp. 351- 366 ,(2009)
Steve Schramm, Craig Priess, Fraud detection and analysis ,(2014)
Mu Zhang, Heng Yin, Semantics-aware android malware classification Springer, Cham. pp. 19- 43 ,(2015) , 10.1007/978-3-319-47812-8_3
Derek A. Soeder, Michael Wojnowicz, Glenn Chisholm, Matthew Wolff, Xuan Zhao, Wavelet decomposition of software entropy to identify malware ,(2015)