2017
DOI: 10.1007/s10586-017-1110-2
|View full text |Cite
|
Sign up to set email alerts
|

Improvement of malware detection and classification using API call sequence alignment and visualization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(15 citation statements)
references
References 3 publications
0
15
0
Order By: Relevance
“…Second, the proposed system relies on the information derived from the source code to recognize malicious applications by retrieving the prominent application programming interface (API) calls requested by the malware. Numerous studies [9][10][11][12][13][14][15][16] have suggested that API calls can indicate malicious behavior and provide a detailed evaluation of the applications under investigation. Third, Term Frequency-Inverse Document Frequency (TF-IDF) was employed as a feature-weighting technique to reduce the importance of commonly requested features and increase the importance of rarely requested features.…”
Section: )mentioning
confidence: 99%
“…Second, the proposed system relies on the information derived from the source code to recognize malicious applications by retrieving the prominent application programming interface (API) calls requested by the malware. Numerous studies [9][10][11][12][13][14][15][16] have suggested that API calls can indicate malicious behavior and provide a detailed evaluation of the applications under investigation. Third, Term Frequency-Inverse Document Frequency (TF-IDF) was employed as a feature-weighting technique to reduce the importance of commonly requested features and increase the importance of rarely requested features.…”
Section: )mentioning
confidence: 99%
“…Dynamic analysis extracts behavioral features such as system calls [18], instruction sequences, network activities, etc. Imran et al [19] presented a similarity-based malware classification system.…”
Section: A Classification Methods Without Feature Selectionmentioning
confidence: 99%
“…Mohaisen et al [17] obtained file operations, CPU register operations, and network communication by executing the malware in a virtual machine, and classify malware based on machine learning algorithms. Liang et al [17] and Kim et al [18] extracted file operations, network activities, etc., and performed malware classification based on the similarity measures. These techniques improve the performance of malware detection, but they are still challenged by various countermeasures [5].…”
Section: Malware Detection Based On Dynamic Featuresmentioning
confidence: 99%