2016
DOI: 10.1016/j.future.2014.06.001
|View full text |Cite
|
Sign up to set email alerts
|

Hybrids of support vector machine wrapper and filter based framework for malware detection

Abstract: h i g h l i g h t s• A signature-free malware detection approach has been proposed. • A hybrid wrapper-Filter based malware feature selection has been proposed. • Proposed hybrid approach can take advantages from both filter and wrapper. • Models have also been validated by statistical model selection criteria such as Chi Square and Akaike information criterion (AIC). a b s t r a c tMalware replicates itself and produces offspring with the same characteristics but different signatures by using code obfuscation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 103 publications
(39 citation statements)
references
References 31 publications
(56 reference statements)
0
39
0
Order By: Relevance
“…Mohaisen et al [13] proposed an unsupervised behavioral based (dynamic) Windows malware classification technique by monitoring file system and memory interactions and achieved more than 98% precision. Huda et al [14] proposed a hybrid framework for malware detection based on programs interactions with Windows Application Program Interface (API) using Support Vector Machines (SVM) wrappers and statistical measures and obtained over 96% detection accuracy.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Mohaisen et al [13] proposed an unsupervised behavioral based (dynamic) Windows malware classification technique by monitoring file system and memory interactions and achieved more than 98% precision. Huda et al [14] proposed a hybrid framework for malware detection based on programs interactions with Windows Application Program Interface (API) using Support Vector Machines (SVM) wrappers and statistical measures and obtained over 96% detection accuracy.…”
Section: Literature Reviewmentioning
confidence: 99%
“…SMO is a WEKA implementation of the sequential minimal optimization algorithm. It is a fast version of support vector machine, which form an important class . SMO can be invoked in WEKA with four kernels.…”
Section: Empirical Studymentioning
confidence: 99%
“…Figure 3 presents the results obtained in filtering phishing emails by these kernels of BN for Dataset A of Table I as training set and Datasets B and C of Table I as validate sets. SMO is a WEKA implementation of the sequential minimal optimization algorithm. It is a fast version of support vector machine, which form an important class [52,53]. SMO can be invoked in WEKA with four kernels.…”
Section: Empirical Studymentioning
confidence: 99%
“…Lakhotia et al [17] developed n-perms, a variant of n-gram, to formalize Op-codes into feature representation. It is noteworthy that API sequences can also be extracted via disassembling [18]. However, only a few malware analysis methods use API sequences obtained by static disassembling, because it is hard to decide parameters of API or track branches and jumps of the execution paths by static analysis.…”
Section: Type Ii: Malware Features Based On Disassemblingmentioning
confidence: 99%
“…Accordingly, an ensemble perceptron algorithm is adopted in [29] with kernel trick and optimized training time to detect unknown and variant malware with low false positive rate. Actually, recent research has already tried and evaluated the most popular supervised learning algorithms in behaviorbased malware detection, such as support vector machine (SVM) [18,29,30], decision trees [12], Naïve Bayes [28] and SMO [23].…”
Section: Machine Learning Algorithms For Malware Detectionmentioning
confidence: 99%