2023
DOI: 10.3390/s23020612
|View full text |Cite
|
Sign up to set email alerts
|

An Insight into the Machine-Learning-Based Fileless Malware Detection

Abstract: In recent years, massive development in the malware industry changed the entire landscape for malware development. Therefore, cybercriminals became more sophisticated by advancing their development techniques from file-based to fileless malware. As file-based malware depends on files to spread itself, on the other hand, fileless malware does not require a traditional file system and uses benign processes to carry out its malicious intent. Therefore, it evades conventional detection techniques and remains steal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 27 publications
(34 reference statements)
0
7
0
Order By: Relevance
“…• Fileless malware attacks computer memory or registries, leaving no files and making detection difficult [11].…”
Section: F Fileless Malware Attacksmentioning
confidence: 99%
See 4 more Smart Citations
“…• Fileless malware attacks computer memory or registries, leaving no files and making detection difficult [11].…”
Section: F Fileless Malware Attacksmentioning
confidence: 99%
“…Sanjay et al [155] proposed a technique that uses memory forensics-based analysis to detect fileless malware based on opcode sequences, whereas Tsai et al [10] utilized multi-label classifiers for de-obfuscating and profiling malicious PowerShell commands. Khalid et al [11] presented an overview of ML techniques for fileless malware detection, suggesting that combining deep-learning methods with large datasets can provide an effective solution. Borana et al [156] VOLUME 11,2023 proposed an assistive tool for detecting fileless malware, whereas Bozkir et al [128] combined memory forensics, manifold learning, and computer vision to detect malware.…”
Section: D: Fileless Malware Attack Detection Approachesmentioning
confidence: 99%
See 3 more Smart Citations