2023
DOI: 10.1145/3567432
|View full text |Cite
|
Sign up to set email alerts
|

Beyond the Hype: An Evaluation of Commercially Available Machine Learning–based Malware Detectors

Abstract: There is a lack of scientific testing of commercially available malware detectors, especially those that boast accurate classification of never-before-seen (i.e., zero-day) files using machine learning (ML). Consequently, efficacy of malware detectors is opaque, inhibiting end users from making informed decisions and researchers from targeting gaps in current detectors. In this paper, we present a scientific evaluation of four prominent commercial malware detection tools to assist an organization with two prim… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 31 publications
0
1
0
Order By: Relevance
“…The proposed technique, known as MAAC, use semantics to decrease the volume of cautions and furnish security investigators with a positioned rundown of potential assault ways and dubious hosts. MAAC demonstrated powerful in decreasing copy alarms and reducing the focal point of safety examiners to basic situations, showing easing the difficulties of ready over-burden in endpoint security potential [1]. Taking everything into account, the field of endpoint security innovations keeps on progressing, with different methodologies and systems created to address the advancing danger scene.…”
Section: Evolution Of Endpoint Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed technique, known as MAAC, use semantics to decrease the volume of cautions and furnish security investigators with a positioned rundown of potential assault ways and dubious hosts. MAAC demonstrated powerful in decreasing copy alarms and reducing the focal point of safety examiners to basic situations, showing easing the difficulties of ready over-burden in endpoint security potential [1]. Taking everything into account, the field of endpoint security innovations keeps on progressing, with different methodologies and systems created to address the advancing danger scene.…”
Section: Evolution Of Endpoint Securitymentioning
confidence: 99%
“…Endpoint security arrangements with VPNs, multifaceted confirmation, and secure access controls empowered associations to get remote workplaces. Contextual investigations flourish where these actions forestalled unapproved access and information breaks while guaranteeing the efficiency of remote employees [1]. 6.…”
Section: Case Studies and Use Casesmentioning
confidence: 99%
“…Traditional malware detection techniques mainly rely on signature matching techniques and heuristic detection, but this type of rule matching has the low capability for generalization and finding unknown malware [5]. Machine learning techniques have evolved in recent years and have become another important way to solve malware detection.…”
Section: Introductionmentioning
confidence: 99%