2020
DOI: 10.14569/ijacsa.2020.0111025
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Anomalous In-Memory Process based on DLL Sequence

Abstract: The use of Computer systems to keep track of day to day activities for single-user systems as well as the implementation of business logic in enterprises is the demand of the hour. As it plays a vital role in making available information on one click as well as impacts improvement in business and influences the profit or loss. There is always a possible threat from unauthorized users as well as untrusted or unknown applications. Trivially a host is intended to run with a list of known or trusted applications b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Hence, this unknown malware will not be detected. Binayak et al [18] create a knowledge database of Inmemory processes based on the use of Dynamic Link Library (DLL) sequences using TF-IDF (Term Frequency-Inverse Document Frequency) and multinomial logistic regression based learning approach. The suspected process from malware uses a different DLL than of system DLL.…”
Section: B Dynamic Analysismentioning
confidence: 99%
“…Hence, this unknown malware will not be detected. Binayak et al [18] create a knowledge database of Inmemory processes based on the use of Dynamic Link Library (DLL) sequences using TF-IDF (Term Frequency-Inverse Document Frequency) and multinomial logistic regression based learning approach. The suspected process from malware uses a different DLL than of system DLL.…”
Section: B Dynamic Analysismentioning
confidence: 99%