Academic literature on the topic 'Malware family'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malware family.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Malware family"

1

Yan, Jinpei, Yong Qi, and Qifan Rao. "Detecting Malware with an Ensemble Method Based on Deep Neural Network." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/7247095.

Full text
Abstract:
Malware detection plays a crucial role in computer security. Recent researches mainly use machine learning based methods heavily relying on domain knowledge for manually extracting malicious features. In this paper, we propose MalNet, a novel malware detection method that learns features automatically from the raw data. Concretely, we first generate a grayscale image from malware file, meanwhile extracting its opcode sequences with the decompilation tool IDA. Then MalNet uses CNN and LSTM networks to learn from grayscale image and opcode sequence, respectively, and takes a stacking ensemble fo
APA, Harvard, Vancouver, ISO, and other styles
2

Jiao, Jian, Qiyuan Liu, Xin Chen, and Hongsheng Cao. "Behavior Intention Derivation of Android Malware Using Ontology Inference." Journal of Electrical and Computer Engineering 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/9250297.

Full text
Abstract:
Previous researches on Android malware mainly focus on malware detection, and malware’s evolution makes the process face certain hysteresis. The information presented by these detected results (malice judgment, family classification, and behavior characterization) is limited for analysts. Therefore, a method is needed to restore the intention of malware, which reflects the relation between multiple behaviors of complex malware and its ultimate purpose. This paper proposes a novel description and derivation model of Android malware intention based on the theory of intention and malware reverse
APA, Harvard, Vancouver, ISO, and other styles
3

Prima, B., and M. Bouhorma. "USING TRANSFER LEARNING FOR MALWARE CLASSIFICATION." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIV-4/W3-2020 (November 23, 2020): 343–49. http://dx.doi.org/10.5194/isprs-archives-xliv-4-w3-2020-343-2020.

Full text
Abstract:
Abstract. In this paper, we propose a malware classification framework using transfer learning based on existing Deep Learning models that have been pre-trained on massive image datasets. In recent years there has been a significant increase in the number and variety of malwares, which amplifies the need to improve automatic detection and classification of the malwares. Nowadays, neural network methodology has reached a level that may exceed the limits of previous machine learning methods, such as Hidden Markov Models and Support Vector Machines (SVM). As a result, convolutional neural network
APA, Harvard, Vancouver, ISO, and other styles
4

Jang, Jae-wook, and Huy Kang Kim. "Function-Oriented Mobile Malware Analysis as First Aid." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/6707524.

Full text
Abstract:
Recently, highly well-crafted mobile malware has arisen as mobile devices manage highly valuable and sensitive information. Currently, it is impossible to detect and prevent all malware because the amount of new malware continues to increase exponentially; malware detection methods need to improve in order to respond quickly and effectively to malware. For the quick response, revealing the main purpose or functions of captured malware is important; however, only few recent works have attempted to find malware’s main purpose. Our approach is designed to help with efficient and effective inciden
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Changguang, Ziqiu Zhao, Fangwei Wang, and Qingru Li. "A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet." Security and Communication Networks 2021 (January 5, 2021): 1–16. http://dx.doi.org/10.1155/2021/6658842.

Full text
Abstract:
With the rapid increase in the amount and type of malware, traditional methods of malware detection and family classification for IoT applications through static and dynamic analysis have been greatly challenged. In this paper, a new simple and effective attention module of Convolutional Neural Networks (CNNs), named as Depthwise Efficient Attention Module (DEAM), is proposed and combined with a DenseNet to propose a new malware detection and family classification model. Based on the good effect of the DenseNet in the field of image classification and the visual similarity of the malware famil
APA, Harvard, Vancouver, ISO, and other styles
6

Abuthawabeh, Mohammad, and Khaled Mahmoud. "Enhanced Android Malware Detection and Family Classification, using Conversation-level Network Traffic Features." International Arab Journal of Information Technology 17, no. 4A (2020): 607–14. http://dx.doi.org/10.34028/iajit/17/4a/4.

Full text
Abstract:
Signature-based malware detection algorithms are facing challenges to cope with the massive number of threats in the Android environment. In this paper, conversation-level network traffic features are extracted and used in a supervised-based model. This model was used to enhance the process of Android malware detection, categorization, and family classification. The model employs the ensemble learning technique in order to select the most useful features among the extracted features. A real-world dataset called CICAndMal2017 was used in this paper. The results show that Extra-trees classifier
APA, Harvard, Vancouver, ISO, and other styles
7

Cheng, Binlin, Jinjun Liu, Jiejie Chen, et al. "MoG: Behavior-Obfuscation Resistance Malware Detection." Computer Journal 62, no. 12 (2019): 1734–47. http://dx.doi.org/10.1093/comjnl/bxz033.

Full text
Abstract:
Abstract Malware brings a big security threat on the Internet today. With the great increasing malware attacks. Behavior-based detection approaches are one of the major method to detect zero-day malware. Such approaches often use API calls to represent the behavior of malware. Unfortunately, behavior-based approaches suffer from behavior obfuscation attacks. In this paper, we propose a novel malware detection approach that is both effective and efficient. First, we abstract the API call to object operation. And then we generate the object operation dependency graph based on these object operat
APA, Harvard, Vancouver, ISO, and other styles
8

Shao, Ke, Qiang Xiong, and Zhiming Cai. "FB2Droid: A Novel Malware Family-Based Bagging Algorithm for Android Malware Detection." Security and Communication Networks 2021 (June 19, 2021): 1–13. http://dx.doi.org/10.1155/2021/6642252.

Full text
Abstract:
As the number of Android malware applications continues to grow at a high rate, detecting malware to protect the system security and user privacy is becoming increasingly urgent. Each malware application belongs to a specific family, and there is a gap in the number of malware families. The accuracy of detection can be improved if malware family information is well utilized and certain strategies are adopted to balance the variability among samples. In addition, the performance of a base classifier is limited. If an ensemble classifier or an ensemble method can be adopted, the detection effect
APA, Harvard, Vancouver, ISO, and other styles
9

Alswaina, Fahad, and Khaled Elleithy. "Android Malware Family Classification and Analysis: Current Status and Future Directions." Electronics 9, no. 6 (2020): 942. http://dx.doi.org/10.3390/electronics9060942.

Full text
Abstract:
Android receives major attention from security practitioners and researchers due to the influx number of malicious applications. For the past twelve years, Android malicious applications have been grouped into families. In the research community, detecting new malware families is a challenge. As we investigate, most of the literature reviews focus on surveying malware detection. Characterizing the malware families can improve the detection process and understand the malware patterns. For this reason, we conduct a comprehensive survey on the state-of-the-art Android malware familial detection,
APA, Harvard, Vancouver, ISO, and other styles
10

Cheng, Binlin, Qiang Tong, Jianhong Wang, and Wenhui Tian. "Malware Clustering Using Family Dependency Graph." IEEE Access 7 (2019): 72267–72. http://dx.doi.org/10.1109/access.2019.2914031.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Malware family"

1

Varga, Adam. "Identifikace a charakterizace škodlivého chování v grafech chování." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442388.

Full text
Abstract:
Za posledné roky je zaznamenaný nárast prác zahrňujúcich komplexnú detekciu malvéru. Pre potreby zachytenia správania je často vhodné pouziť formát grafov. To je prípad antivírusového programu Avast, ktorého behaviorálny štít deteguje škodlivé správanie a ukladá ich vo forme grafov. Keďže sa jedná o proprietárne riešenie a Avast antivirus pracuje s vlastnou sadou charakterizovaného správania bolo nutné navrhnúť vlastnú metódu detekcie, ktorá bude postavená nad týmito grafmi správania. Táto práca analyzuje grafy správania škodlivého softvéru zachytené behavioralnym štítom antivírusového program
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Chi-Feng, and 劉其峰. "Malware Family Characterization." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/4m43xu.

Full text
Abstract:
碩士<br>國立政治大學<br>資訊管理學系<br>106<br>Nowadays, a massive amount of sensitive data which are accessible and connected through personal computers and cloud services attracts hackers to develop malicious software (malware) to steal them. Owing to the success of deep learning on image and language recognition, researchers direct security systems to analyze and identify malware with deep learning approaches. This paper addresses the problem of analyzing and identifying complex and unstructured malware behaviors by proposing a framework of combining unsupervised and supervised learning algorithms with a
APA, Harvard, Vancouver, ISO, and other styles
3

Kuo, Wen-Han, and 郭文翰. "Artificial Intelligence Technology for Malware Family Detection." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/3q8ee3.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電機工程系<br>107<br>The rapid development of Internet of Things (IoT) devices and communication technologies have greatly expanded the application of the internet. In response to people’s pursuit of high quality of life, the number of IoT devices and related services have increased annually. However, the importance of information security has been overlooked by majority of people, promoting hackers and those with ulterior motives to use malware to attack security holes in Internet applications. With the number of attack incidents increasing, detection system of malware has become
APA, Harvard, Vancouver, ISO, and other styles
4

Zhou, Jun-Da, and 周俊達. "DMFF: Detection Malware by its Family Features." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/53626941465322630802.

Full text
Abstract:
碩士<br>國立交通大學<br>電機工程學系<br>104<br>The population of mobile users grows rapidly and people get used to storing information on a mobile device, hence the possibility under attack raises. Among the mobile attacks, malware is the most common attack and cause large damage for mobile users. For example, A victim may suffer from the information leakage or money lost causing by Short Message Service (SMS) attacks. To improve the security of a mobile device, experts have proposed many methods for malware detection. The website, Datasets, defines four malware families to simplify the detection of malware
APA, Harvard, Vancouver, ISO, and other styles
5

Chiang, Li-Yuan, and 姜立垣. "Malware Family Motif API Sequence Analysis on Windows Platform." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/71906851778430095106.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>104<br>This thesis aims to focus on malware on Windows platform, extracting common characteristic behaviors in a malware family, identifying differentiated characteristic behavior among malware family variants. First, we define a malware process execution to be a Windows API call sequence and winnow parameters in these sequences. Then, in order to compare these sequences, we apply sequence alignment techniques to align similar parts in execution sequences, insert gaps or align mismatch parts in different parts. Thus, we develop a system for multiple sequence alignme
APA, Harvard, Vancouver, ISO, and other styles
6

Chao, Wei-Chieh, and 趙偉傑. "Base on RFpS of Ensemble learning in Malware Family Classification." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/4pavv7.

Full text
Abstract:
碩士<br>淡江大學<br>資訊管理學系碩士在職專班<br>105<br>As we know some fundamental issues of data mining applications are much more critical and severe once it refers to malware analysis, and unfortunately, they are still not well-addressed. In this paper, the proposed a function, as well as uses supervised feature projection for redundant feature reduction and noise filtering. Combining Random Forest with SVM for named RFPS (Random Forest Predicated Svm), Method of reducing feature and fast classification. The results that the learning time about 4.5 times compared with the SVM , predicted speed increa
APA, Harvard, Vancouver, ISO, and other styles
7

Chiu, Wei-Jhih, and 邱偉志. "Automated Malware Family Signature Generation based on Runtime API Call Sequence." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/etw684.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>106<br>Recent years, the threats from malware are increasing in the world. It is important if we analyze the malwares and extract their signatures. The malware threat detection and defense will benefit from that.This research collected the malware family labels from anti-virus vendors and analyzed the behavior intents of malware family. We designed a API Call Sequence-based clustering algorithm – RasMMA, which could extract the common signature of a group of malwares. If we input some malware profiles, RasMMA algorithm could cluster the malware samples and output th
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Ting-Yi, and 陳廷易. "Malware Family Classification System based on Attention-based Characteristic Execution Sequence." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/6jj2mm.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>107<br>In recent years, the number of malicious software (malware) has increased rapidly, which has caused a lot of losses for individuals and businesses around the world. Understanding the intention of malware and extracting key execution behaviors will considerably help detect and defend against malware. This research proposes an automated important execution sequence behavior identification system. The recurrent neural network and self-attention mechanism are used as the basis of the architecture. It is used to analyze Windows API call invocations sequence record
APA, Harvard, Vancouver, ISO, and other styles
9

Hsueh, Chu-Yun, and 薛筑允. "Automated Generation and Semantic Analysis of System-state-change Activity Lifecycle of Malware Family." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/5676wn.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>106<br>In this work, we aim to visualize the common behavior of malware family that cause system state changes. First of all, we conduct a malware classification based on proposed family classification algorithm. Secondly, we use the high-level semantics profiling system to profile different variants of malware family, generating the time-ordered sequences of each variant, called execution traces. Then, in order to differentiate behavior diversity between different variants in same malware family, we input execution trace of each variant to Runtime API call sequence
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Malware family"

1

Basole, Samanvitha, and Mark Stamp. "Cluster Analysis of Malware Family Relationships." In Malware Analysis Using Artificial Intelligence and Deep Learning. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62582-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aman, Naqqash, Yasir Saleem, Fahim H. Abbasi, and Farrukh Shahzad. "A Hybrid Approach for Malware Family Classification." In Applications and Techniques in Information Security. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5421-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Islam, Rafiqul, and Irfan Altas. "A Comparative Study of Malware Family Classification." In Information and Communications Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34129-8_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shrestha, Prasha, Suraj Maharjan, Gabriela Ramírez de la Rosa, Alan Sprague, Thamar Solorio, and Gary Warner. "Using String Information for Malware Family Identification." In Advances in Artificial Intelligence -- IBERAMIA 2014. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12027-0_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Choudhary, Chhaya, Raaghavi Sivaguru, Mayana Pereira, Bin Yu, Anderson C. Nascimento, and Martine De Cock. "Algorithmically Generated Domain Detection and Malware Family Classification." In Communications in Computer and Information Science. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5826-5_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gayathri, T., and M. S. Vijaya. "Malware Family Classification Model Using Convolutional Neural Network." In Advances in Intelligent Systems and Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0171-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Davis, Shreya, C. N. Sminesh, K. S. Akshay, T. R. Akshay, and Anjali Ranjith. "An Evaluation of Convolutional Neural Networks for Malware Family Classification." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9700-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Yihang, Fudong Liu, Zheng Shan, and Guanghui Liang. "MalCommunity: A Graph-Based Evaluation Model for Malware Family Clustering." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2203-7_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Yeali S., Chien-Chun Chen, Shun-Wen Hsiao, and Meng Chang Chen. "ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps." In Information Security and Privacy. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93638-3_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gayathri, T., and M. S. Vijaya. "Malware Family Classification Model Using User Defined Features and Representation Learning." In IFIP Advances in Information and Communication Technology. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63467-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Malware family"

1

Kumar, Nitish, and Toshanlal Meenpal. "Texture-Based Malware Family Classification." In 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, 2019. http://dx.doi.org/10.1109/icccnt45670.2019.8944659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hsiao, Shun-Wen, Yeali S. Sun, and Meng Chang Chen. "Behavior grouping of Android malware family." In ICC 2016 - 2016 IEEE International Conference on Communications. IEEE, 2016. http://dx.doi.org/10.1109/icc.2016.7511424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pitolli, Gregorio, Leonardo Aniello, Giuseppe Laurenza, Leonardo Querzoni, and Roberto Baldoni. "Malware family identification with BIRCH clustering." In 2017 International Carnahan Conference on Security Technology (ICCST). IEEE, 2017. http://dx.doi.org/10.1109/ccst.2017.8167802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Turker, Sercan, and Ahmet Burak Can. "AndMFC: Android Malware Family Classification Framework." In 2019 IEEE 30th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops). IEEE, 2019. http://dx.doi.org/10.1109/pimrcw.2019.8880840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Walker, Aaron, and Shamik Sengupta. "Malware Family Fingerprinting Through Behavioral Analysis." In 2020 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2020. http://dx.doi.org/10.1109/isi49825.2020.9280529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xie, Qi, Yongjun Wang, and Zhiquan Qin. "Malware Family Classification using LSTM with Attention." In 2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI). IEEE, 2020. http://dx.doi.org/10.1109/cisp-bmei51763.2020.9263499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nomura, Kazuya, Daiki Chiba, Mitsuaki Akiyama, and Masato Uchida. "Auto-creation of Android Malware Family Tree." In ICC 2021 - IEEE International Conference on Communications. IEEE, 2021. http://dx.doi.org/10.1109/icc42927.2021.9500876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, Shun-Chieh, Yeali S. Sun, Wu-Long Chuang, Meng-Chang Chen, Bo Sun, and Takeshi Takahashi. "ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family." In 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 2018. http://dx.doi.org/10.1109/prdc.2018.00047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boukhtouta, Amine, Nour-Eddine Lakhdari, and Mourad Debbabi. "Inferring Malware Family through Application Protocol Sequences Signature." In 2014 6th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2014. http://dx.doi.org/10.1109/ntms.2014.6814026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Chin-Wei, Ching-Hung Su, Kun-Wei Lee, and Ping-Hao Bair. "Malware Family Classification using Active Learning by Learning." In 2020 22nd International Conference on Advanced Communication Technology (ICACT). IEEE, 2020. http://dx.doi.org/10.23919/icact48636.2020.9061419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!