2021
DOI: 10.1109/access.2020.3048319
|View full text |Cite
|
Sign up to set email alerts
|

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
56
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 92 publications
(56 citation statements)
references
References 164 publications
0
56
0
Order By: Relevance
“…The choice of these algorithms was dictated by the following factors: Random Forest has been proven in multiple studies on network attacks; its performance was always high [ 4 ], and results were satisfactory, and the authors have found promising results from the utilization of this algorithm in earlier work [ 54 , 55 ]. The Gradient Boosted Trees (GBT) algorithm combines the advantages of RandomForest with the added benefit of gradient utilization.…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The choice of these algorithms was dictated by the following factors: Random Forest has been proven in multiple studies on network attacks; its performance was always high [ 4 ], and results were satisfactory, and the authors have found promising results from the utilization of this algorithm in earlier work [ 54 , 55 ]. The Gradient Boosted Trees (GBT) algorithm combines the advantages of RandomForest with the added benefit of gradient utilization.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…One of the mechanisms at the forefront of attack detection are Intrusion Detection Systems (IDS). The constant evolution of malware drives further development of IDS [ 4 ]. One of the most important aspects of state-of-the-art IDS comes with the utilization of the machine-learning (ML) technologies.…”
Section: Introductionmentioning
confidence: 99%
“…Caviglione et al [108] aimed at providing a bird's eye view of the development trends such as bio-inspired learning, transfer learning, and federated learning, and issues covering sophisticated techniques like information hiding and fileless malware. They also provided a meta-review over the existing malware detection-based surveys.…”
Section: A Surveys On Iot Malware Threat Huntingmentioning
confidence: 99%
“…The evolution of malware detection approaches was reviewed in detail by Caviglione et al [8]. The literature showed five main approaches to malware detection: the early detection systems relied on signatures, the more recent ones use behavior-based, heuristic-based, energy-based, or bioinspired techniques.…”
Section: Traditional Malware Detection Approachesmentioning
confidence: 99%