2017
DOI: 10.1007/978-3-319-59427-9_79
|View full text |Cite
|
Sign up to set email alerts
|

SBRT: API Signature Behaviour Based Representation Technique for Improving Metamorphic Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Many research studies were conducted on attacker profiling from the viewpoint of malware creation. Mohaisen A, et al classified the malware group through dynamic analysis based on the API behavior that occurs when executing malware and estimated the same attacker [1,2,24,25,26], whereas Kinable, et al studied the method of malicious code classification through static analysis based on the call graph of malicious code [3,4,27]. Regarding attacker profiling from the viewpoint of botnet, Gu, G., M. Feily, et al conducted a study on analyzing the attack resources possessed by the same attacker by detecting botnets and analyzing the command and control channel [5,6].…”
Section: Related Workmentioning
confidence: 99%
“…Many research studies were conducted on attacker profiling from the viewpoint of malware creation. Mohaisen A, et al classified the malware group through dynamic analysis based on the API behavior that occurs when executing malware and estimated the same attacker [1,2,24,25,26], whereas Kinable, et al studied the method of malicious code classification through static analysis based on the call graph of malicious code [3,4,27]. Regarding attacker profiling from the viewpoint of botnet, Gu, G., M. Feily, et al conducted a study on analyzing the attack resources possessed by the same attacker by detecting botnets and analyzing the command and control channel [5,6].…”
Section: Related Workmentioning
confidence: 99%
“…In addition, having a new literature review can be influenced on the research studies and explore some technical details in malware detection using data mining techniques. Of course, some research [13][14][15][16][17] had discussed the malware detection approaches. There are some defects in the surveyed research.…”
mentioning
confidence: 99%