Crowdroid: behavior-based malware detection system for android

I Burguera, U Zurutuza, S Nadjm-Tehrani - … of the 1st ACM workshop on …, 2011 - dl.acm.org
The sharp increase in the number of smartphones on the market, with the Android platform
posed to becoming a market leader makes the need for malware analysis on this platform an …

Anomaly detection: A survey

V Chandola, A Banerjee, V Kumar - ACM computing surveys (CSUR), 2009 - dl.acm.org
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …

Intrusion detection techniques in cloud environment: A survey

P Mishra, ES Pilli, V Varadharajan… - Journal of Network and …, 2017 - Elsevier
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …

Anomaly detection for discrete sequences: A survey

V Chandola, A Banerjee… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
This survey attempts to provide a comprehensive and structured overview of the existing
research for the problem of detecting anomalies in discrete/symbolic sequences. The …

Precision and recall for time series

N Tatbul, TJ Lee, S Zdonik, M Alam… - Advances in neural …, 2018 - proceedings.neurips.cc
Classical anomaly detection is principally concerned with point-based anomalies, those
anomalies that occur at a single point in time. Yet, many real-world anomalies are range …

Automatic analysis of malware behavior using machine learning

K Rieck, P Trinius, C Willems… - Journal of computer …, 2011 - content.iospress.com
Malicious software–so called malware–poses a major threat to the security of computer
systems. The amount and diversity of its variants render classic security defenses ineffective …

Host-based intrusion detection system with system calls: Review and future trends

M Liu, Z Xue, X Xu, C Zhong, J Chen - ACM computing surveys (CSUR), 2018 - dl.acm.org
In a contemporary data center, Linux applications often generate a large quantity of real-time
system call traces, which are not suitable for traditional host-based intrusion detection …

An overview of anomaly detection techniques: Existing solutions and latest technological trends

A Patcha, JM Park - Computer networks, 2007 - Elsevier
As advances in networking technology help to connect the distant corners of the globe and
as the Internet continues to expand its influence as a medium for communications and …

A survey on heuristic malware detection techniques

Z Bazrafshan, H Hashemi, SMH Fard… - The 5th conference on …, 2013 - ieeexplore.ieee.org
Malware is a malicious code which is developed to harm a computer or network. The
number of malwares is growing so fast and this amount of growth makes the computer …

A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns

G Creech, J Hu - IEEE Transactions on Computers, 2013 - ieeexplore.ieee.org
Host-based anomaly intrusion detection system design is very challenging due to the
notoriously high false alarm rate. This paper introduces a new host-based anomaly intrusion …