2011
DOI: 10.1049/iet-ifs.2010.0180
|View full text |Cite
|
Sign up to set email alerts
|

Using opcode sequences in single-class learning to detect unknown malware

Abstract: Malware is any type of malicious code that has the potential to harm a computer or network. The volume of malware is growing at a faster rate every year and poses a serious global security threat. Although signaturebased detection is the most widespread method used in commercial antivirus programs, it consistently fails to detect new malware. Supervised machinelearning models have been used to address this issue. However, the use of supervised learning is limited because it needs a large amount of malicious co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 50 publications
(19 citation statements)
references
References 32 publications
0
15
0
Order By: Relevance
“…Several measures have been proposed in the literature for evaluating the predictive accuracy of machine learning based classifiers. These efficiency measures have been utilized in previous machine learning work [22], [28], [29], for example. In the context of our problem, the relevant measures utilized in our experiments are given below.…”
Section: Evaluation Measuresmentioning
confidence: 99%
“…Several measures have been proposed in the literature for evaluating the predictive accuracy of machine learning based classifiers. These efficiency measures have been utilized in previous machine learning work [22], [28], [29], for example. In the context of our problem, the relevant measures utilized in our experiments are given below.…”
Section: Evaluation Measuresmentioning
confidence: 99%
“…Many malware detection methods analyze n-grams generated from the data, where an n-gram is defined as a sequential set of n commands. [17] analyzes opcode sequence 2 g (known as bigrams) and applies SVM to detect malware based on bigram frequencies. Ref.…”
Section: Literature Overviewmentioning
confidence: 99%
“…The authors show that their results are more satisfying than the ones got by commercial antivirus software. Concerning the search and analysis of opcodes (from operation code, a portion of a machine language instruction that specifies the operation to be performed), we can mention the literature . In the work of O'Kane, it is aimed at individuating a subset of opcodes suitable for malware detection through SVM.…”
Section: State Of the Artmentioning
confidence: 99%
“…Using opcode sequences typically needs to label a large amount of both malicious and benign code. Santos et al propose a method that uses single‐class learning to detect unknown malware families. Specific results vary if labeling is performed through malicious or benign software but in general: labeling 60 % of the legitimate software assures about 85 % accuracy.…”
Section: State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation