2013
DOI: 10.1007/978-3-642-38631-2_16
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging String Kernels for Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…The literature is full of ML-based approaches applied to dynamic analysis traces. For instance, classic machine learning models [16], [77], such as Markov chain and Support Vector Machines, were applied on sequences of system calls derived from dynamic analysis to capture sequential patterns of successively executed system calls. Pascanu et al [73], inspired by text classification research, proposed the use of recurrent neural networks, such as Long Short-Term Memory (LSTM) [42] and Gated Recurrent Units (GRU) [27] for modeling system call sequences.…”
Section: A Classifiermentioning
confidence: 99%
“…The literature is full of ML-based approaches applied to dynamic analysis traces. For instance, classic machine learning models [16], [77], such as Markov chain and Support Vector Machines, were applied on sequences of system calls derived from dynamic analysis to capture sequential patterns of successively executed system calls. Pascanu et al [73], inspired by text classification research, proposed the use of recurrent neural networks, such as Long Short-Term Memory (LSTM) [42] and Gated Recurrent Units (GRU) [27] for modeling system call sequences.…”
Section: A Classifiermentioning
confidence: 99%
“…Exploration of using machine learning in this space has witnessed the use of both traditional and deep learning models. Support Vector Machines (SVM) have been incorporated into this task by [26]. Hidden Markov Models have been explored by [3].…”
Section: Related Workmentioning
confidence: 99%
“…Classifier Used for Malware Detection There is a large body of work regarding behavior-based malware detection approaches [2,12,13,9]. In this work we use the insights given by Canali et al [2], which indicate that simple ngram approaches perform poorly with respect to variations in syscall logs.…”
Section: Effectiveness Evaluationmentioning
confidence: 99%
“…In this work we use the insights given by Canali et al [2], which indicate that simple ngram approaches perform poorly with respect to variations in syscall logs. Therefore we chose to use support vector machines (SVMs) for our evaluation, which is a more advanced classifier, often employed by state of the art malware detection approaches [12,13,9]. SVMs can only process numerical feature vectors.…”
Section: Effectiveness Evaluationmentioning
confidence: 99%