144
Views
15
CrossRef citations to date
0
Altmetric
Articles

Analysis of machine learning models for malware detection

, , &

References

  • H. J. van der Molen, “Forecasting Malware Conditions: Worsening Conditions, Some Bright Spots,” Inf. Secur. J., vol. 21, no. 5, pp. 269– 279, 2012.
  • E. Gandotra, D. Bansal, and S. Sofat, “Malware Threat Assessment Using Fuzzy Logic Paradigm,” Cybern. Syst., vol. 48, no. 1, pp. 29–48, 2017. doi: 10.1080/01969722.2016.1262704
  • A. Sharma and S. K. Sahay, “Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey,” Int. J. Comput. Appl., vol. 90, no. 2, pp. 7–11, 2014.
  • S. K. Sahay, A. Sharma, and H. Rathore, “Evolution of Malware and Its Detection Techniques,” in Information and Communication Technology for Sustainable Development, Advances in Intelligent Systems and Computing, Springer Singapore, 2020, pp. 139–150.
  • I. You and K. Yim, “Malware obfuscation techniques: A brief survey,” Proc. - 2010 Int. Conf. Broadband, Wirel. Comput. Commun. Appl. BWCCA 2010, pp. 297–300, 2010.
  • P. Taylor et al., “Metamorphic Malware Detection Using Code Metrics,” no. December, pp. 37–41, 2014.
  • Y. Dong, Z. Liu, Y. Yan, Y. Wang, T. Peng, and J. Zhang, “Machine Learning for Analyzing Malware,” vol. 10394, 2017, pp. 386–398.
  • M. Ijaz, M. H. Durad, and M. Ismail, “Static and Dynamic Malware Analysis Using Machine Learning,” Proc. 2019 16th Int. Bhurban Conf. Appl. Sci. Technol. IBCAST 2019, pp. 687–691, 2019.
  • H. Rathore, S. Agarwal, S. K. Sahay, and M. Sewak, Malware detection using machine learning and deep learning, vol. 11297 LNCS. Springer International Publishing, 2018.
  • A. Kutlay and K. Karađuzović-Hadžiabdić, “Static Based Classification of Malicious Software Using Machine Learning Methods,” vol. 2, pp. 621–628, 2020.
  • A. R. Mohammed, G. Sai Viswanath, K. Sai babu, and T. Anuradha, “Malware Detection in Executable Files Using Machine Learning,” Springer International Publishing, 2020, pp. 277–284.
  • Yask, & Kumar, B. S. (2019). Construct the filter for malware detection in distributed control system. Journal of Information and Optimization Sciences, 40(5), 1155-1166. doi: 10.1080/02522667.2019.1642433
  • A. Yewale and M. Singh, “Malware detection based on opcode frequency,” Proc. 2016 Int. Conf. Adv. Commun. Control Comput. Technol. ICACCCT 2016, no. 978, pp. 646–649, 2017.
  • A. I. Elkhawas and N. Abdelbaki, “Malware Detection using Opcode Trigram Sequence with SVM,” 2018 26th Int. Conf. Software, Telecommun. Comput. Networks, SoftCOM 2018, pp. 7–11, 2018.
  • M. Uchnar and P. Fecilak, “Behavioral malware analysis algorithm comparison,” pp. 397–400, 2019.
  • O. E. David and N. S. Netanyahu, “DeepSign: Deep learning for automatic malware signature generation and classification,” Proc. Int. Jt. Conf. Neural Networks, vol. 2015-Septe, no. July, pp. 1–8, 2015.
  • A. Irshad, R. Maurya, M. K. Dutta, R. Burget, and V. Uher, “Feature Optimization for Run Time Analysis of Malware in Windows Operating System using Machine Learning Approach,” 2019 42nd Int. Conf. Telecommun. Signal Process., pp. 255–260, 2019.
  • R. Mosli, R. Li, B. Yuan, and Y. Pan, “A Behavior-Based Approach for Malware Detection,” 2017, pp. 187–201.
  • M. Chowdhury, A. Rahman, and R. Islam, “Malware analysis and detection using data mining and machine learning classification,” Adv. Intell. Syst. Comput., vol. 580, pp. 266–274, 2018.
  • C. T. Dan Lo, P. Ordóñez, and C. Cepeda, “Feature selection and improving classification performance for malware detection,” Proc. - 2016 IEEE Int. Conf. Big Data Cloud Comput. BDCloud 2016, Soc. Comput. Networking, Soc. 2016 Sustain. Comput. Commun. Sustain. 2016, pp. 560–566, 2016.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.