2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Industry Track 2019
DOI: 10.1109/dsn-industry.2019.00010
|View full text |Cite
|
Sign up to set email alerts
|

LAB to SOC: Robust Features for Dynamic Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…Another set of experiments were conducted to select the base classifier. The commonly used classifiers in the existing related works were implemented in this study for the comparison which are Support Vector Machine (SVM) [44], Naïve Bayes (NB) [45], Logistic Regression [46], Random Forest (RF) [47], XGBoost [9] and Deep Learning (DL). These classifiers were trained based on the dataset denoted by DS1 in Table 1.…”
Section: Figure 4 Comparison Of Feature Selection Techniquesmentioning
confidence: 99%
“…Another set of experiments were conducted to select the base classifier. The commonly used classifiers in the existing related works were implemented in this study for the comparison which are Support Vector Machine (SVM) [44], Naïve Bayes (NB) [45], Logistic Regression [46], Random Forest (RF) [47], XGBoost [9] and Deep Learning (DL). These classifiers were trained based on the dataset denoted by DS1 in Table 1.…”
Section: Figure 4 Comparison Of Feature Selection Techniquesmentioning
confidence: 99%
“…This method has a low false-positive rate, on other hand, this method has high detection time and high complexity, which makes it unsuitable for use in modern cars. Similarly, the authors of [158], [159] proposed a dynamic malware detection approach based on analysis of API calls and permissions. Other work by Das et al [154] proposed a dynamic hardware-based method for detecting malware based on system call patterns by using processor and field-programmable gate array (FPGA).…”
Section: B Behaviour-based Malware Detectionmentioning
confidence: 99%
“…For instance, the behavior-based detection approach is insufficient for recognizing and categorizing all of a program's behaviors as malicious or benign. As a result, an abnormally high rate of false positives or false negatives may occur [144], [158]. Furthermore, complex code obfuscation and evasion techniques might simply prevent malware from being properly assessed [143].…”
Section: B Behaviour-based Malware Detectionmentioning
confidence: 99%
“…Other dynamic data sources include dynamic opcode sequences (e.g., Carlin et al [9] achieved 99% using a Random Forest), hardware performance counters (e.g., Sayadi [15] achieved 94% on Linux/Ubuntu malware using a decision tree), network activity and file system activity (e.g., Usman et al [16] achieved 93% using a decision tree in combination with threat intelligence feeds and these data sources), and machine activity metrics (e.g., Burnap et al [17] achieved 94% using a self-organising map). Previous work [18] demonstrated the robustness of machine activity metrics over API calls in detecting malware collected from different sources.…”
Section: Malware Detection With Static or Post-collectionmentioning
confidence: 99%
“…Despite the popularity of API calls noted in Ref. [18], due to these findings and Sun et al's [23] difficulties hooking this data in real-time, these were not considered as features to train the model.…”
Section: Featuresmentioning
confidence: 99%