A survey on machine learning-based malware detection in executable files

作者: Jagsir Singh , Jaswinder Singh

DOI: 10.1016/J.SYSARC.2020.101861

关键词: Computer scienceTrojan horseMachine learningRootkitThe InternetExecutableArtificial intelligenceSoftwareAdwareRansomwareMalware

摘要: … malware classifiers. At last future directive is discussed to develop an effective malware detection system … paper presents the evolution and present state of malware detection systems. …

参考文章(109)
Massimo Ficco, Francesco Palmieri, Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios Journal of Systems Architecture. ,vol. 97, pp. 107- 129 ,(2019) , 10.1016/J.SYSARC.2019.04.004
Ilker Kara, A basic malware analysis method Computer Fraud & Security. ,vol. 2019, pp. 11- 19 ,(2019) , 10.1016/S1361-3723(19)30064-8
Jan Stiborek, Tomás̆ Pevný, Martin Rehák, None, Multiple instance learning for malware classification Expert Systems With Applications. ,vol. 93, pp. 346- 357 ,(2018) , 10.1016/J.ESWA.2017.10.036
Arivudainambi D., Varun Kumar K.A., Sibi Chakkaravarthy S., Visu P., Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance Computer Communications. ,vol. 147, pp. 50- 57 ,(2019) , 10.1016/J.COMCOM.2019.08.003
Mayuri Wadkar, Fabio Di Troia, Mark Stamp, Detecting Malware Evolution Using Support Vector Machines Expert Systems With Applications. ,vol. 143, pp. 113022- ,(2020) , 10.1016/J.ESWA.2019.113022
Jose Pergentino Araujo Neto, Donald M. Pianto, Célia Ghedini Ralha, MULTS: A Multi-cloud Fault-tolerant Architecture to Manage Transient Servers in Cloud Computing Journal of Systems Architecture. ,vol. 101, pp. 101651- ,(2019) , 10.1016/J.SYSARC.2019.101651
Xiangyuan Sun, Xiaoyong Li, Kaijun Ren, Junqiang Song, Zichen Xu, Jing Chen, Rethinking compact abating probability modeling for open set recognition problem in Cyber-physical systems Journal of Systems Architecture. ,vol. 101, pp. 101660- ,(2019) , 10.1016/J.SYSARC.2019.101660
Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, Fagen Li, A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud Journal of Systems Architecture. ,vol. 102, pp. 101653- ,(2020) , 10.1016/J.SYSARC.2019.101653
Amir Namavar Jahromi, Sattar Hashemi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Hadis Karimipour, David Ellis Newton, Reza M. Parizi, An improved two-hidden-layer extreme learning machine for malware hunting Computers & Security. ,vol. 89, pp. 101655- ,(2020) , 10.1016/J.COSE.2019.101655
Khalid Khan, Amjad Mehmood, Shafiullah Khan, Muhammad Altaf Khan, Zeeshan Iqbal, Wali Khan Mashwani, A survey on intrusion detection and prevention in wireless ad-hoc networks Journal of Systems Architecture. ,vol. 105, pp. 101701- ,(2020) , 10.1016/J.SYSARC.2019.101701