Wawryn et al., 2021 - Google Patents
Detection of anomalies in compiled computer program files inspired by immune mechanisms using a template methodWawryn et al., 2021
View HTML- Document ID
- 12585474661739554753
- Author
- Wawryn K
- Widuliński P
- Publication year
- Publication venue
- Journal of Computer Virology and Hacking Techniques
External Links
Snippet
An intrusion detection system inspired by the human immune system is described: a custom artificial immune system that monitors a local area containing critical files in the operating system. The proposed mechanism scans the files and checks for possible malware-induced …
- 238000001514 detection method 0 title abstract description 70
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Aslan et al. | Intelligent behavior-based malware detection system on cloud computing environment | |
| Surendran et al. | A TAN based hybrid model for android malware detection | |
| Liu et al. | SecDeep: Secure and performant on-device deep learning inference framework for mobile and IoT devices | |
| Poudyal et al. | Analysis of crypto-ransomware using ML-based multi-level profiling | |
| Banin et al. | Multinomial malware classification via low-level features | |
| Chandramohan et al. | A scalable approach for malware detection through bounded feature space behavior modeling | |
| Wawryn et al. | Detection of anomalies in compiled computer program files inspired by immune mechanisms using a template method | |
| Fattori et al. | Hypervisor-based malware protection with accessminer | |
| Gómez‐Hernández et al. | Inhibiting crypto‐ransomware on windows platforms through a honeyfile‐based approach with R‐Locker | |
| Wheeler | Countering trusting trust through diverse double-compiling | |
| Sandıkkaya et al. | DeMETER in clouds: detection of malicious external thread execution in runtime with machine learning in PaaS clouds | |
| Gupta et al. | Detection of vulnerabilities in blockchain smart contracts: a review | |
| Kumar et al. | Efficient hashing technique for malicious profile detection at hypervisor environment | |
| Zhou et al. | Hardware-based on-line intrusion detection via system call routine fingerprinting | |
| Zhang et al. | Android malware detection combined with static and dynamic analysis | |
| Sivaraju | An insight into deep learning based cryptojacking detection model | |
| Piromsopa et al. | Survey of protections from buffer-overflow attacks | |
| Zuhair | A panoramic evaluation of machine learning and deep learning-aided ransomware detection tools using a hybrid cluster of rich smartphone traits | |
| Buchner et al. | Survey on trusted execution environments | |
| Lanet et al. | Memory forensics of a java card dump | |
| Nugraha et al. | Malware classification using machine learning algorithm | |
| Daghmehchi Firoozjaei et al. | Parent process termination: an adversarial technique for persistent malware | |
| Çalışkan et al. | The Recent Trends in Ransomware Detection and Behaviour Analysis | |
| Poudyal | Multi-level analysis of Malware using Machine Learning | |
| Wang et al. | Machine-learning-based malware detection for virtual machine by analyzing opcode sequence |