2009
DOI: 10.1016/j.istr.2009.03.003
|View full text |Cite
|
Sign up to set email alerts
|

Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
116
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 273 publications
(121 citation statements)
references
References 37 publications
0
116
0
Order By: Relevance
“…Bilar [6] proposed using mnemonics of assembly instructions from file content as a predictor for malware. Statistical machine learning and data science methods [9] have been increasingly used for malware detection, including approaches based on support vector machines, logistic regression, Naïve Bayes, neural networks, deep learning, wavelet transforms, decision trees and k-nearest neighbors [4,8,13,16,[29][30][31][32]37].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Bilar [6] proposed using mnemonics of assembly instructions from file content as a predictor for malware. Statistical machine learning and data science methods [9] have been increasingly used for malware detection, including approaches based on support vector machines, logistic regression, Naïve Bayes, neural networks, deep learning, wavelet transforms, decision trees and k-nearest neighbors [4,8,13,16,[29][30][31][32]37].…”
Section: Related Workmentioning
confidence: 99%
“…Even though several machine learning classifiers [30] and digital forensics methods [10] have been used for file analysis and malware detection, this work is the first to use time series shapelets in the computer security domain in general, and for malware detection in particular. We believe shapelets are inherently wellsuited to malware detection as they identify local discriminative patterns, and identifying these patterns helps identify unknown malware.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…It has been observed that each of the two approaches had some limitations. Further antivirus vendors attempted to use individual as well as hybrid analysis approach for mining features and tackling newly emerging malwares [1]. They achieved a precise detection rate and low false positives compared to existing malware detection methods.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, opcode sequences have recently been introduced as an alternative to byte n-grams (Dolev and Tzachar, 2008;Santos et al, 2010;Moskovitch et al, 2008a). This approach appears to be theoretically better because it relies on source code rather than the bytes of a binary file (Christodorescu, 2007) (for a more detailed review of static features for machine-learning unknown malware detection refer to Shabtai et al (2009)). …”
Section: Introductionmentioning
confidence: 99%