2016 Cybersecurity Symposium (CYBERSEC) 2016
DOI: 10.1109/cybersec.2016.008
|View full text |Cite
|
Sign up to set email alerts
|

Neural Network Analysis of System Call Timing for Rootkit Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…There have been several works on dynamic malware detection using traditional machine learning approaches. The works in [14], [16] focused on using system calls as features. Firdausi et al [14] employed traditional machine learning algorithms such as KNN, Naive Bayes, decision trees and SVM, where as Lucket et al [16] used neural networks.…”
Section: A Dynamic Malware Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…There have been several works on dynamic malware detection using traditional machine learning approaches. The works in [14], [16] focused on using system calls as features. Firdausi et al [14] employed traditional machine learning algorithms such as KNN, Naive Bayes, decision trees and SVM, where as Lucket et al [16] used neural networks.…”
Section: A Dynamic Malware Detectionmentioning
confidence: 99%
“…The works in [14], [16] focused on using system calls as features. Firdausi et al [14] employed traditional machine learning algorithms such as KNN, Naive Bayes, decision trees and SVM, where as Lucket et al [16] used neural networks. The works in [18], [15] rely on system performance metrics and traditional ML algorithms for malware detection.…”
Section: A Dynamic Malware Detectionmentioning
confidence: 99%
“…Research in [11], [15] utilize system calls as features to train classical machine learning models (i.e. KNN, NB, SVC and DT) and neural networks, respectively.…”
Section: A Related Workmentioning
confidence: 99%
“…1) Unlike traditional host-based approaches in [9], [11], [15], [19]- [23], we aim to focus on developing a cloudspecific approach. Our experiment deployment, which consists of a commonly used three-tier web architecture, gives our collected data the added benefit of being generated in an extremely realistic cloud environment.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation