2011 IEEE 35th Annual Computer Software and Applications Conference Workshops 2011
DOI: 10.1109/compsacw.2011.28
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Rule-Based Malware Detection Employing Learning Classifier Systems: A Proof of Concept

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(7 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…A number of different techniques for semi-supervised learning have been proposed, such as the Expectation Maximization (EM) based algorithms (Goldstein, 2012), self-training (Blount et al, 2011;Lyngdoh et al, 2018), co-training (Rath et al, 2017), Semi-Supervised SVM (Ashfaq et al, 2017), graph-based methods (Sadreazami et al, 2018), and boosting based semi-supervised learning methods (Yuan et al, 2016). Rana et al propose a novel fuzzy-based semi-supervised learning approach by applying unlabelled samples aided with a supervised learning algorithm to enhance the classifier's performance for the IDSs.…”
Section: Semi-supervised Learningmentioning
confidence: 99%
“…A number of different techniques for semi-supervised learning have been proposed, such as the Expectation Maximization (EM) based algorithms (Goldstein, 2012), self-training (Blount et al, 2011;Lyngdoh et al, 2018), co-training (Rath et al, 2017), Semi-Supervised SVM (Ashfaq et al, 2017), graph-based methods (Sadreazami et al, 2018), and boosting based semi-supervised learning methods (Yuan et al, 2016). Rana et al propose a novel fuzzy-based semi-supervised learning approach by applying unlabelled samples aided with a supervised learning algorithm to enhance the classifier's performance for the IDSs.…”
Section: Semi-supervised Learningmentioning
confidence: 99%
“…The eigenvalues of op code based graph images can calculated by measuring the distances between the nodes based on the K Nearest Neighbor Algorithm (KNN Algorithm), which is one of the machine learning algorithms [9]. In addition, the processed strings can be reprocessed with the Logistic Common Subsequence (LCS) algorithm to measure the eigenvalues of the strings [10]. In the studies introduced above, static analysis-based methods collect signatures or list the signatures in sequence, but cannot identify the accurate features of behaviors because they are based on code-based feature extraction.…”
Section: Related Workmentioning
confidence: 99%
“…Concerning the large and heterogeneous family of misuse based IDS, recent research includes the following papers, among many others. In the work of Blount et al, it is a paper whose experimental results show the detection ability of the system to learn effective rules from repeated presentations of a tagged training set. Best system accuracy is close to 90 % .…”
Section: State Of the Artmentioning
confidence: 99%