Owing to the lack of prevention ability of traditional anti-virus methods, a behavior-based virus prevention model for detecting unknown virus is proposed in this study. We first defined the behaviors of an executable by observing its usage of dynamically linked libraries and Application Programming Interfaces. Then, information gain and support vector machines were applied to filter out the redundant behavior attributes and select informative feature for training a virus classifier. The performance of our model was evaluated by a dataset contains 1,758 benign executables and 846 viruses. The experiment results are promising, and the overall accuracies are 99 % and 96.66 % for detecting the known viruses and the previously unseen viruses re...
The widespread use of the Internet has caused computer security to become an important issue. Curren...
Based on the latest statistics, we can see a significant increase in the amount of malware on the ma...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
Anti-virus systems traditionally use signatures to detect malicious executables, but signatures are ...
Malicious executables are computer programs, which may cause damages or inconveniences for computer ...
In this paper, we present a novel approach to detect unknown virus using dynamic instruction sequenc...
Researchers employ behavior based malware detection models that depend on API tracking and analyzing...
A serious security threat today is malicious executables, especially new, unseen malicious executabl...
Detecting unknown viruses is a challenging research topic. Data mining approaches have been used to ...
In this paper, we present a novel approach to detect unknown virus using dynamic instruction sequenc...
Computer viruses have existed since the early days of personal computers, and have since become a ub...
Machine learning techniques are widely used in many fields. One of the applications of machine learn...
Computer viruses remain a tangible threat to systems both within the Department of Defense and throu...
AbstractThe number of malware is increasing rapidly regardless of the common use of anti-malware sof...
Abstract—Malware is coined as an instance of malicious code that has the potential to harm a compute...
The widespread use of the Internet has caused computer security to become an important issue. Curren...
Based on the latest statistics, we can see a significant increase in the amount of malware on the ma...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
Anti-virus systems traditionally use signatures to detect malicious executables, but signatures are ...
Malicious executables are computer programs, which may cause damages or inconveniences for computer ...
In this paper, we present a novel approach to detect unknown virus using dynamic instruction sequenc...
Researchers employ behavior based malware detection models that depend on API tracking and analyzing...
A serious security threat today is malicious executables, especially new, unseen malicious executabl...
Detecting unknown viruses is a challenging research topic. Data mining approaches have been used to ...
In this paper, we present a novel approach to detect unknown virus using dynamic instruction sequenc...
Computer viruses have existed since the early days of personal computers, and have since become a ub...
Machine learning techniques are widely used in many fields. One of the applications of machine learn...
Computer viruses remain a tangible threat to systems both within the Department of Defense and throu...
AbstractThe number of malware is increasing rapidly regardless of the common use of anti-malware sof...
Abstract—Malware is coined as an instance of malicious code that has the potential to harm a compute...
The widespread use of the Internet has caused computer security to become an important issue. Curren...
Based on the latest statistics, we can see a significant increase in the amount of malware on the ma...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...