Malware Detection Method Based on File and Registry Operations Using Machine Learning
Abstract
Keywords
References
- [1] Ö. Aslan, R. Samet. "Investigation of possibilities to detect malware using existing tools," IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA) (pp. 1277-1284), October 2017.
- [2] Ö. Aslan and R.Samet. "A comprehensive review on malware detection approaches," IEEE Access, 8, 6249-6271, 2020.
- [3] A. Souri and R. Hosseini. "A state-of-the-art survey of malware detection approaches using data mining techniques," Human-centric Computing and Information Sciences, 8(1), 1-22, 2018.
- [4] Ö. Aslan, R. Samet and Ö.Ö. Tanrıöver. "Using a Subtractive Center Behavioral Model to Detect Malware, " Security and Communication Networks, 2020, 2020.
- [5] J. Nazari. "Defense and Detection Strategies against Internet Worms," Artech House, 2004.
- [6] S. Sparks and J. Butler. "Shadow walker: Raising the bar for rootkit detection," Black Hat Japan, 11(63), 504-533, 2005.
- [7] K. Savage, P. Coogan, and H. Lau. "The evolution of ransomware," Symantec report, August 2015.
- [8] P. Luckett, J. T. McDonald and J. Dawson. "Neural network analysis of system call timing for rootkit detection," Cybersecurity Symposium (CYBERSEC) (pp. 1-6), April 2016.
Details
Primary Language
English
Subjects
Computer Software
Journal Section
Research Article
Publication Date
August 31, 2022
Submission Date
December 28, 2021
Acceptance Date
May 25, 2022
Published in Issue
Year 2022 Volume: 5 Number: 2
Cited By
SİBERUZAMDA SUÇ TİPOLOJİLERİ VE SİBER İLETİŞİM TABANLI ÇÖZÜMLEME MODELİNİN ANALİZİ
Kahramanmaraş Sütçü İmam Üniversitesi Mühendislik Bilimleri Dergisi
https://doi.org/10.17780/ksujes.1477116
