2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) 2017
DOI: 10.1109/ecai.2017.8166505
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic analysis of malware using artificial neural networks: Applying machine learning to identify malicious behavior based on parent process hirarchy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 2 publications
0
0
0
Order By: Relevance
“…The ANN is designed to simulate the working of human brain in processing of incoming information. In pattern recognition process, the ANN gathers their knowledge from the experiments on determined data training [29]. In this research work, the ANN architecture consists of 2 Hidden layers, where the numbers of neurons in each layer are 50 neurons, while Input layer has 5 neurons.…”
Section: Classificationmentioning
confidence: 99%
“…The ANN is designed to simulate the working of human brain in processing of incoming information. In pattern recognition process, the ANN gathers their knowledge from the experiments on determined data training [29]. In this research work, the ANN architecture consists of 2 Hidden layers, where the numbers of neurons in each layer are 50 neurons, while Input layer has 5 neurons.…”
Section: Classificationmentioning
confidence: 99%
“…In the field of cyber security, machine learning methods such as K-Nearest Neighbor (KNN), Naive Bayes Classifier, Decision Tree and Support Vector Machine (SVM) have proven to be indispensable tools in revealing malicious intentions of heterogeneous structures [2]. There were many studies that produced different solutions to detect and eliminate malware [3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%