2016
DOI: 10.18517/ijaseit.6.6.1382
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Predictive Analytic Applications of Bayesian Network

Abstract: Malware can be defined as malicious software that infiltrates a network and computer host in a variety of ways, from software flaws to social engineering. Due to the polymorphic and stealth nature of malware attacks, a signature-based analysis that is done statically is no longer sufficient to solve such a problem. Therefore, a behavioral or anomalous analysis will provide a more dynamic approach for the solution. However, recent studies have shown that current behavioral methods at the network-level have seve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Bayesian Networks (BNs) are well-known probabilistic models, frequently used to depict complex phenomena having in mind their intrinsic uncertainty. Those structures have been widely used in a number of application areas, including finance, machine learning, speech recognition, gene regulatory networks, and illness detection; examples of applications of BNs in various domains may be found in [14,15].…”
Section: Bayesian Networkmentioning
confidence: 99%
“…Bayesian Networks (BNs) are well-known probabilistic models, frequently used to depict complex phenomena having in mind their intrinsic uncertainty. Those structures have been widely used in a number of application areas, including finance, machine learning, speech recognition, gene regulatory networks, and illness detection; examples of applications of BNs in various domains may be found in [14,15].…”
Section: Bayesian Networkmentioning
confidence: 99%
“…Although highly accurate, it can be easily bypassed with this advanced type of attack because it relies only on signatures [39].…”
Section: Related Workmentioning
confidence: 99%
“…These methods often suffer from high false-positive rates and are time-consuming. In addition, reducing extracted features or API calls will significantly affect detection success rates [17], [39]. The heuristic-based approach proves effective in detecting attacks that involve direct malware files dropping into the system.…”
Section: Introductionmentioning
confidence: 99%
“…Predictive modelling using BN have been studied for healthcare risk modelling Mesgarpour et al [20], for prediction of future event of large scale complex event from IOT network [29], computer security analytics [30] and life sciences [50]. BN has also been studied for course selection of high school environment [31].…”
Section: Bayesian Network Technique For Predicting At-risk Studentsmentioning
confidence: 99%