Review of Soft Computing in Malware Detection
نویسندگان
چکیده
Soft computing techniques are widely used in malware detection in these days. These techniques have the ability of learning from the past incidences and can categories normal and abnormal behaviour. In this paper we have reviewed various soft computing techniques. A review of application of these soft-computing techniques in malware detection has also been presented in this paper. Despite so much research, techniques with good accuracy and low false alarm rate are still needs attention.
منابع مشابه
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...
متن کاملPothole Detection by Soft Computing
Subject- Potholes on roads are regarded as serious problems in the transportation domain and ignoring them leads to the increase of accidents, traffic, vehicle fuel consumption and waste of time and energy. As a result, pothole detection has attracted researchers’ attention and different methods have been presented for it up to now. Background- The major part of previous research is based on i...
متن کاملA new method of fuzzy patches construction in Neuro-Fuzzy for malware detection
Soft Computing is being widely used in Information Security applications. Particularly, Neuro-Fuzzy approach provides a classification with humanunderstandable rules, yet the accuracy may not be sufficiently high. In this paper we seek for an optimal fuzzy patch configuration that uses elliptic fuzzy patches to automatically extract parameters for the Mamdami-type rules. We proposed a new metho...
متن کاملEvaluation of machine learning classifiers for mobile malware detection
Mobile devices have become a significant part of people’s lives, leading to an increasing number of users involved with such technology. The rising number of users invites hackers to generate malicious applications. Besides, the security of sensitive data available on mobile devices is taken lightly. Relying on currently developed approaches is not sufficient, given that intelligent malware kee...
متن کاملClassification of Ultra-high Resolution Images using Soft Computing
The main objective of this paper is to use a computational intelligence algorithm for preparing a mapping map that categorizes different patterns of identification of infected areas and changes in radiation pollution. In this paper, the use of the fuzzy inference system has been proposed to determine the degree of radiation contamination in the regions. The study uses ultra-high resolution spec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011