[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Stopel et al., 2009 - Google Patents

Using artificial neural networks to detect unknown computer worms

Stopel et al., 2009

View PDF
Document ID
7235482334587194224
Author
Stopel D
Moskovitch R
Boger Z
Shahar Y
Elovici Y
Publication year
Publication venue
Neural Computing and Applications

External Links

Snippet

Detecting computer worms is a highly challenging task. We present a new approach that uses artificial neural networks (ANN) to detect the presence of computer worms based on measurements of computer behavior. We compare ANN to three other classification …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Abdallah et al. Intrusion detection systems using supervised machine learning techniques: a survey
Moskovitch et al. Detection of unknown computer worms based on behavioral classification of the host
Nissim et al. Detecting unknown computer worm activity via support vector machines and active learning
Shrivastava et al. Attack detection and forensics using honeypot in IoT environment
Li et al. DMalNet: Dynamic malware analysis based on API feature engineering and graph learning
EP1814055B1 (en) Improved method and system for detecting malicious behavioral patterns in a computer, using machine learning
Subba et al. A tfidfvectorizer and singular value decomposition based host intrusion detection system framework for detecting anomalous system processes
Tajoddin et al. RAMD: registry-based anomaly malware detection using one-class ensemble classifiers
Abirami et al. Building an ensemble learning based algorithm for improving intrusion detection system
Jang et al. Mal‐Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph
Gulmez et al. XRan: Explainable deep learning-based ransomware detection using dynamic analysis
Finder et al. Time-interval temporal patterns can beat and explain the malware
Stopel et al. Application of artificial neural networks techniques to computer worm detection
Zouhri et al. Evaluating the impact of filter-based feature selection in intrusion detection systems
EP1879124A1 (en) Improved method and system for detecting malicious behavioral patterns in a computer, using machine leaning
Stopel et al. Using artificial neural networks to detect unknown computer worms
Surakhi et al. A comprehensive survey for machine learning and deep learning applications for detecting intrusion detection
Baychev et al. Spearphishing malware: Do we really know the unknown?
Chaudhari et al. A novel hybrid framework for cloud intrusion detection system using system call sequence analysis
Moskovitch et al. Host based intrusion detection using machine learning
Shenderovitz et al. Bon-APT: Detection, attribution, and explainability of APT malware using temporal segmentation of API calls
Stopel et al. Improving worm detection with artificial neural networks through feature selection and temporal analysis techniques
Moskovitch et al. Detection of unknown computer worms activity based on computer behavior using data mining
Rozenberg et al. A method for detecting unknown malicious executables
Song et al. A study of the relationship of malware detection mechanisms using Artificial Intelligence