2021 2nd International Conference on Smart Electronics and Communication (ICOSEC) 2021
DOI: 10.1109/icosec51865.2021.9591763
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey on Identification of Malware Types and Malware Classification Using Machine Learning Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Viruses are self-replicating programs that associate themselves with legitimate files or programs and infect other files or computers‫۔‬ They can damage data by corrupting or altering it, interfering with system functionality, and spreading it to other devices [2].…”
Section: Virusesmentioning
confidence: 99%
See 1 more Smart Citation
“…Viruses are self-replicating programs that associate themselves with legitimate files or programs and infect other files or computers‫۔‬ They can damage data by corrupting or altering it, interfering with system functionality, and spreading it to other devices [2].…”
Section: Virusesmentioning
confidence: 99%
“…Worms are stand-alone programs that replicate and spread freely across networks, often exploiting security vulnerabilities‫۔‬ Unlike viruses, they do not need to be linked to existing files‫۔‬ Insects can use network bandwidth, subdue the system, and help spread other malware [2].…”
Section: Wormsmentioning
confidence: 99%
“…The authors obtained labels from videos annotated by human judges [7] Then, the authors in used computer vision and machine learning techniques to identify the affect of students in a school computer laboratory, where the students were interacting with an educational game aimed to explain fundamental concepts of classical mechanics. [8] Unauthorized Access: Using malware to gain access to data for a deep learning project without proper authorization is illegal and unethical. It violates the privacy rights of individuals and the terms of service of the online platform.…”
Section: Literature Surveymentioning
confidence: 99%
“…Numerous studies have explored the use of machine learning techniques to detect ransomware based on network traffic analysis. Machine learning algorithms, such as decision trees, neural networks, support vector machines, and ensemble methods, were employed to analyze complex and often non-linear data structures inherent in network traffic, and they achieved varying levels of success, highlighting the potential and limitations of each approach [1,2]. Neural networks were particularly noted for their ability to model non-linear relationships and adapt to new, previously unseen patterns of ransomware behavior, providing a dynamic approach to detection [3,4].…”
Section: Related Studiesmentioning
confidence: 99%