2020 21st International Arab Conference on Information Technology (ACIT) 2020
DOI: 10.1109/acit50332.2020.9300081
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Analysis of Machine Learning Techniques for Classification and Detection of Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…A malware detector has a data collector that collects information about the program interpreter and data matcher. Program interpreter converts the data to a useful representation, data matchers compare the interpreted data with the program behavior (Al-Janabi and Altamimi, 2020). Most of the literature classifies anomaly detection as shown below (Alabadi and Celik, 2020):…”
Section: Intrusion Detection Systems (Ids)mentioning
confidence: 99%
“…A malware detector has a data collector that collects information about the program interpreter and data matcher. Program interpreter converts the data to a useful representation, data matchers compare the interpreted data with the program behavior (Al-Janabi and Altamimi, 2020). Most of the literature classifies anomaly detection as shown below (Alabadi and Celik, 2020):…”
Section: Intrusion Detection Systems (Ids)mentioning
confidence: 99%
“…The introduction of these security mechanisms in conjunction with platform improvements of Treble [78], [79], original equipment manufacturer (OEM) agreements and Android Enterprise Recommended has significantly advanced and improved the Android ecosystem security. Despite all the security advancements, 0.11% of Android mobile devices were compromised by user-wanted (UW) PHAs called Chamois [80] in 2018. Other variants such as Snowfox, Cosiloon, BreadSMS, View SDK, Triada, CardinalFall Eager-Fonts, and Idle Coconut [81] later emerged with similar characteristics.…”
Section: Smart Malware Evasion Trends Using Technological Techniquesmentioning
confidence: 99%
“…Important information like this can be stolen, modified or deleted by attackers with malware attacks. Malware can infiltrate the system by taking advantage of security vulnerabilities in the network, causing significant damage, especially to institutions and organizations [3]. Therefore, protection from malware attacks is one of the important issues in terms of providing cyber security.…”
Section: Introductionmentioning
confidence: 99%