2019
DOI: 10.1007/s11280-019-00675-z
|View full text |Cite
|
Sign up to set email alerts
|

MALDC: a depth detection method for malware based on behavior chains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(21 citation statements)
references
References 27 publications
0
20
0
Order By: Relevance
“…Recently; deep learning-, cloud-, mobile devices-, and IoT-based approaches have started to be used in malware detection (VI). Deep learning-based detection approaches are effective to detect new malware and reduce features space sharply [108], [109], but it is not resistant to some evasion attacks. On the other hand, cloud-based detection approaches increase DR, decrease FPs, and provide bigger malware databases and powerful computational resources [110].…”
Section: Evaluation On Malware Detection Approachesmentioning
confidence: 99%
“…Recently; deep learning-, cloud-, mobile devices-, and IoT-based approaches have started to be used in malware detection (VI). Deep learning-based detection approaches are effective to detect new malware and reduce features space sharply [108], [109], but it is not resistant to some evasion attacks. On the other hand, cloud-based detection approaches increase DR, decrease FPs, and provide bigger malware databases and powerful computational resources [110].…”
Section: Evaluation On Malware Detection Approachesmentioning
confidence: 99%
“…Recent works on malware behaviors are represented in [19,[29][30][31]. Lightweight behavioral malware detection for windows platforms is explained in [29].…”
Section: Related Workmentioning
confidence: 99%
“…Feature representation Goal/success Year Wagener et al [14] System calls, Hellinger distance, phylogenetic tree Identify new and different forms of malware 2008 Park et al [15] Creating system call diagrams Identify different forms of malware 2013 Islam et al [16] Printable strings, API method frequencies Identify malware with 97% accuracy 2013 Naval et al [17] Diagram of system calls and relations Detect code insertion attacks 2015 Das et al [18] System call frequencies, n-gram Identify new and different forms of malware 2016 Zhang et al [19] API calls sequence to construct a behavior chain It achieved 98.64% accuracy with 2% FPR 2019…”
Section: Papermentioning
confidence: 99%
See 1 more Smart Citation
“…Zheng et al [43] creates a behavior chain that aids in its detection method. The method monitors behavior points based on API calls and then uses the respective calling sequence at runtime to construct a behavior chain.…”
Section: Related Workmentioning
confidence: 99%