Review of Soft Computing in Malware Detection

نویسندگان

  • Raman Singh
  • Harish Kumar
  • R. K. Singla
  • Won Kim
  • Chulyun Kim
  • Dipankar Dasgupta
  • Senhua Yu
  • Shelly Xiaonan Wu
  • Gulshan Kumar
  • Krishan Kumar
  • Monika Sachdeva
  • Francesco Gringoli
  • Chet Langin
  • Shahram Rahimi
  • Izzeldin Mohamed Osman
  • Lanjia Wang
  • Zhichun Li
  • Yan Chen
  • Yong Tang
  • Bin Xiao
  • Xicheng Lu
  • Frederic Massicotte
  • Asaf Shabtai
  • Eitan Menahem
چکیده

Soft computing techniques are widely used in malware detection in these days. These techniques have the ability of learning from the past incidences and can categories normal and abnormal behaviour. In this paper we have reviewed various soft computing techniques. A review of application of these soft-computing techniques in malware detection has also been presented in this paper. Despite so much research, techniques with good accuracy and low false alarm rate are still needs attention.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...

متن کامل

Pothole Detection by Soft Computing

Subject- Potholes on roads are regarded as serious problems in the transportation domain and ignoring them leads to the increase of accidents, traffic, vehicle fuel consumption and waste of time and energy. As a result, pothole detection has attracted researchers’ attention and different methods have been presented for it up to now. Background- The major part of previous research is based on i...

متن کامل

A new method of fuzzy patches construction in Neuro-Fuzzy for malware detection

Soft Computing is being widely used in Information Security applications. Particularly, Neuro-Fuzzy approach provides a classification with humanunderstandable rules, yet the accuracy may not be sufficiently high. In this paper we seek for an optimal fuzzy patch configuration that uses elliptic fuzzy patches to automatically extract parameters for the Mamdami-type rules. We proposed a new metho...

متن کامل

Evaluation of machine learning classifiers for mobile malware detection

Mobile devices have become a significant part of people’s lives, leading to an increasing number of users involved with such technology. The rising number of users invites hackers to generate malicious applications. Besides, the security of sensitive data available on mobile devices is taken lightly. Relying on currently developed approaches is not sufficient, given that intelligent malware kee...

متن کامل

Classification of Ultra-high Resolution Images using Soft Computing

The main objective of this paper is to use a computational intelligence algorithm for preparing a mapping map that categorizes different patterns of identification of infected areas and changes in radiation pollution. In this paper, the use of the fuzzy inference system has been proposed to determine the degree of radiation contamination in the regions. The study uses ultra-high resolution spec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011