2013
DOI: 10.1016/j.patrec.2013.05.006
|View full text |Cite
|
Sign up to set email alerts
|

Malware detection by pruning of parallel ensembles using harmony search

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(14 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…Researchers built ensemble malware detectors [1,10,11,14,17,18,20,22,24,25,29,30,35,36,38], based on combining general detectors. Moreover, most of them used off-line analysis [1,10,14,25,29,30,35,36]. A few used dynamic analysis [11,20,24] and some used both static and dynamic analysis [17,18,22].…”
Section: Related Workmentioning
confidence: 99%
“…Researchers built ensemble malware detectors [1,10,11,14,17,18,20,22,24,25,29,30,35,36,38], based on combining general detectors. Moreover, most of them used off-line analysis [1,10,14,25,29,30,35,36]. A few used dynamic analysis [11,20,24] and some used both static and dynamic analysis [17,18,22].…”
Section: Related Workmentioning
confidence: 99%
“…Santos et al [16] proposed a machine learning-based malware detection method by using Op-code n-gram fea- [19,20,22,[35][36][37] Type IV APIs N -grams [5,8,[23][24][25][26][27][28] Type V Hybrid Hybrid [30][31][32][33] tures. Lakhotia et al [17] developed n-perms, a variant of n-gram, to formalize Op-codes into feature representation.…”
Section: Type Ii: Malware Features Based On Disassemblingmentioning
confidence: 99%
“…However, API n-grams always suffer from the "curse of dimensionality," and additional feature selection methods must be performed. Moreover, API parameters contain rich semantic information, but many API n-gram methods [8,[24][25][26][27] do not consider API parameters, which lead to a loss of information. As an improvement, Cheng et al [28] used some reducing and substituting rules to category parameters of API calls.…”
Section: Types III and Iv: Malware Features Based On Apismentioning
confidence: 99%
“…Bai et al, [14] proposed critical API calling graph (CA G) and extracted CA G fro m the control flow graph for detecting the malware. Sheen et al, [15] proposed to prune the ensemble which detects the malware using harmony search and most recently, Nissim et al, [16] proposed a novel active learning method to detect new Malware files. Ahmed et al, [17] had used spatio-temporal information in API calls as feature selection for classifying the malware samp les.…”
Section: Related Workmentioning
confidence: 99%