2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) 2018
DOI: 10.1109/icicct.2018.8473321
|View full text |Cite
|
Sign up to set email alerts
|

A Zero-Day Resistant Malware Detection Method for Securing Cloud Using SVM and Sandboxing Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…There is no such thing as a 0-day detector It is usual for many ML-based detector proposals to state that their approach are resistant to 0-day attacks (i.e., attacks leveraging so-far unknown threats and/or payloads) because they rely on a ML model [1,95]. This is also somehow a pitfall, and we credit this as the poor understanding that ML models are a type of signature, as previously presented.…”
Section: 2mentioning
confidence: 92%
“…There is no such thing as a 0-day detector It is usual for many ML-based detector proposals to state that their approach are resistant to 0-day attacks (i.e., attacks leveraging so-far unknown threats and/or payloads) because they rely on a ML model [1,95]. This is also somehow a pitfall, and we credit this as the poor understanding that ML models are a type of signature, as previously presented.…”
Section: 2mentioning
confidence: 92%
“…They applied six different classifiers and observed that RF achieved the best accuracy for both static and dynamic analyses, 98.21% and 98.92%, respectively. Similarly, the studies ( Patidar & Khandelwal, 2019 ; Gupta & Rani, 2018 ; Kumar & Singh, 2018 ; Venkatraman & Alazab, 2018 ) claim zero-day malware detection using machine learning techniques. The study ( Zhang, Kuo & Yang, 2019 ) focuses on malware type detection or classification of malware family instead of binary classification.…”
Section: Literature Reviewmentioning
confidence: 97%
“…This method is essentially a manual comparison of some systems' typical actions. Lowering the , [55], [58], [59], [62], [63], [65], [68], [72], [73], [74], [75], [78], [79], [80], [82], [86], [91], [92], [93], [95], [97], [103], [104], [106], [107], [108], [110], [111], [112], [114], [115], [116], [117], [118], [120], [122], [123], [126] Behaviorbased…”
Section: D: Specification-basedmentioning
confidence: 99%
“…Furthermore, the outdated dataset used in the experiment, which offers little or no utility as a benchmark for the performance of malware detection systems on a modern network [119], also contributed to this issue. [53], [58], [59], [65], [68], [78], [79], [82], [86], [91], [95], [97], [103], [104], [106], [108], [111], [112], [115], [118], [120], [122], [123] Dynamic 2 6 5 9 2 2 1 1 2 0 2 [55], [62], [63], [72], [74], [75], [92], [93], [107], [110], [113], [114], [116], [117], [126] Hybrid 2 4 3 4 1 0 0 3 1 1 3 [54], [56], [57], [60], [61], [64], [66], [67], [69], [70]...…”
Section: A Dataset Usedmentioning
confidence: 99%