A comprehensive survey on deep learning based malware detection techniques

M Gopinath, SC Sethuraman - Computer Science Review, 2023 - Elsevier
Recent theoretical and practical studies have revealed that malware is one of the most
harmful threats to the digital world. Malware mitigation techniques have evolved over the …

Artificial intelligence-based malware detection, analysis, and mitigation

A Djenna, A Bouridane, S Rubab, IM Marou - Symmetry, 2023 - mdpi.com
Malware, a lethal weapon of cyber attackers, is becoming increasingly sophisticated, with
rapid deployment and self-propagation. In addition, modern malware is one of the most …

Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency

C Xiong, T Zhu, W Dong, L Ruan… - … on Dependable and …, 2020 - ieeexplore.ieee.org
Advanced Persistent Threat (APT) attacks have caused serious security threats and financial
losses worldwide. Various real-time detection mechanisms that combine context information …

Mvc-rsn: A malware classification method with variant identification ability

W Wu, H Peng, H Zhu, L Li - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
With the rapid development of the Internet of Things (IoT), a substantial number of mobile
devices may need to be connected to and communicate with the other devices. IoT smart …

ConLBS: An Attack Investigation Approach Using Contrastive Learning with Behavior Sequence

J Li, R Zhang, J Liu - Sensors, 2023 - mdpi.com
Attack investigation is an important research field in forensics analysis. Many existing
supervised attack investigation methods rely on well-labeled data for effective training. While …

Remote access trojan traffic early detection method based on Markov matrices and deep learning

B Pi, C Guo, Y Cui, G Shen, J Yang, Y Ping - Computers & Security, 2024 - Elsevier
Abstract Remote Access Trojan (RAT) allows the attacker to gain remote control of an
infected system and steal data from it. Due to over-reliance on expert experience and …

基于系统溯源图的威胁发现与取证分析综述

冷涛, 蔡利君, 于爱民, 朱子元, 马建刚, 李超飞… - 通信 …, 2022 - infocomm-journal.com
通过调研溯源图研究相关的文献, 提出了基于系统溯源图的网络威胁发现和取证分析研究框架.
详细综述了基于溯源图的数据采集, 数据管理, 数据查询和可视化方法; 提出了基于规则 …

Kellect: a kernel-based efficient and lossless event log collector

T Chen, Q Song, X Qiu, T Zhu, Z Zhu, M Lv - arXiv preprint arXiv …, 2022 - arxiv.org
As an essential element for log analysis, the system kernel-based event can be effectively
employed in the hybrid computing environment integrated with cloud, edge, and endpoint for …

TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events

Z Li, Y Wei, X Shen, L Wang, Y Chen, H Xu, S Ji… - arXiv preprint arXiv …, 2024 - arxiv.org
The evolution and advancement of cyberattacks pose challenges to existing security
products. Recent concentrated research on provenance graph-based detection has proved …

Leveraging machine learning for proactive detection and mitigation of Android RAT

S Ghosh, J Ponduru, M Thatikonda… - Innovations in Systems and …, 2024 - Springer
Abstract Remote Access Trojans (RATs) have gathered reasonable attention in the evolving
realm of cybersecurity due to their stealthy characteristics and the capacity to cause …