Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
Metamorphic malware modifies its code structure using a morphing engine to evade traditional signature-based detection. Previous research has shown the use of opcode instructions as feature representation with Hidden Markov Model in the context of metamorphic malware detection. However, it would be...
| Main Authors: | Ling, Yeong Tyng, Mohd Sani, Nor Fazlida, Abdullah, Mohd Taufik, Abdul Hamid, Nor Asilah Wati |
|---|---|
| Format: | Article |
| Published: |
Springer Cham
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/94169/ |
Similar Items
Structural features with nonnegative matrix factorization for metamorphic malware detection
by: Yeong, Tyng Ling, et al.
Published: (2021)
by: Yeong, Tyng Ling, et al.
Published: (2021)
Nonnegative matrix factorization and metamorphic malware detection
by: Ling, Yeong Tyng, et al.
Published: (2019)
by: Ling, Yeong Tyng, et al.
Published: (2019)
Short review on metamorphic malware detection in Hidden Markov Models
by: Yeong, T. Ling, et al.
Published: (2017)
by: Yeong, T. Ling, et al.
Published: (2017)
Hidden Markov models: an insight
by: Mohd Yusoff, Mohd Izhan, et al.
Published: (2014)
by: Mohd Yusoff, Mohd Izhan, et al.
Published: (2014)
Extracting features for the linguistic variables of fuzzy rules using hidden Markov model
by: Suliman, Azizah, et al.
Published: (2007)
by: Suliman, Azizah, et al.
Published: (2007)
Topic transition detection using hierarchical hidden Markov and semi-Markov models
by: Phung, Dinh, et al.
Published: (2005)
by: Phung, Dinh, et al.
Published: (2005)
Bio-inspired for Features Optimization and Malware Detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
Effects of Time and Frequency Resolution on Nonnegative Matrix Factorization
by: Sophea, Seng, et al.
Published: (2007)
by: Sophea, Seng, et al.
Published: (2007)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Speaker recognition based on Hidden Markov Model
by: Shaikh Salleh, Sheikh Hussain, et al.
Published: (2000)
by: Shaikh Salleh, Sheikh Hussain, et al.
Published: (2000)
Speech Signal Endpoint Detection Using Hidden Markov Models
by: Ahmed, M. Masroor, et al.
Published: (2006)
by: Ahmed, M. Masroor, et al.
Published: (2006)
An efficient nonnegative matrix factorization approach in flexible Kernel space
by: Zhang, D., et al.
Published: (2009)
by: Zhang, D., et al.
Published: (2009)
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019)
by: Mohammad Salehi, .
Published: (2019)
Disease surveillance using a hidden Markov model
by: Watkins, Rochelle, et al.
Published: (2009)
by: Watkins, Rochelle, et al.
Published: (2009)
Activity recognition and abnormality detection with the switching hidden semi-Markov model
by: Duong, Thi, et al.
Published: (2005)
by: Duong, Thi, et al.
Published: (2005)
Parameter selection for nonnegative l1 matrix/tensor sparse decomposition
by: Wang, Y., et al.
Published: (2015)
by: Wang, Y., et al.
Published: (2015)
A matrix factorization framework for jointly analyzing multiple nonnegative data
by: Gupta, Sunil, et al.
Published: (2011)
by: Gupta, Sunil, et al.
Published: (2011)
Comparative analysis and how efficient deep learning methods of malware detection
by: Mustapha, Norwati, et al.
Published: (2024)
by: Mustapha, Norwati, et al.
Published: (2024)
Evaluation of feature selection algorithm for android malware detection
by: Mazlan, Nurul Hidayah, et al.
Published: (2018)
by: Mazlan, Nurul Hidayah, et al.
Published: (2018)
Revealing Distinct Neural Signatures in Magnetoencephalography with Hidden Markov Models
by: Seedat, Zelekha Abid
Published: (2022)
by: Seedat, Zelekha Abid
Published: (2022)
Analysis of known and unknown malware bypassing techniques
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics
by: Ahmad, Firdaus, et al.
Published: (2017)
by: Ahmad, Firdaus, et al.
Published: (2017)
Word classification for sign language synthesizer using hidden Markov model
by: Maarif, Haris Al Qodri, et al.
Published: (2014)
by: Maarif, Haris Al Qodri, et al.
Published: (2014)
Forward-Backward smoothing for hidden markov models of point pattern data
by: Dam, N., et al.
Published: (2018)
by: Dam, N., et al.
Published: (2018)
English digits speech recognition system based on Hidden Markov Models
by: Abushariah, Ahmad A. M., et al.
Published: (2010)
by: Abushariah, Ahmad A. M., et al.
Published: (2010)
English digits speech recognition system based on hidden Markov Models
by: Gunawan, Teddy Surya, et al.
Published: (2011)
by: Gunawan, Teddy Surya, et al.
Published: (2011)
Efficient duration modelling in the hierarchical hidden semi-Markov models and their applications
by: Duong, Thi V. T.
Published: (2008)
by: Duong, Thi V. T.
Published: (2008)
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
Applying Bayesian probability for Android malware detection using permission features
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
Learning and detecting activities from movement trajectories using the hierarchical hidden Markov model
by: Nguyen, Nam, et al.
Published: (2005)
by: Nguyen, Nam, et al.
Published: (2005)
Determining a Suitable Desired Factors for Nonnegative Matrix Factorization in Polyphonic Music Transcription
by: Sophea, Seng, et al.
Published: (2007)
by: Sophea, Seng, et al.
Published: (2007)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024)
by: Kadhum, Laith M., et al.
Published: (2024)
Automated feature selection using boruta algorithm to detect mobile malware
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
A Dynamic Hidden Markov Random Field Model for Foreground and Shadow Segmentation
by: Wang, Y., et al.
Published: (2005)
by: Wang, Y., et al.
Published: (2005)
Hidden markov model for decision making among heterogeneous systems in intelligent building
by: Abba, Babakura
Published: (2014)
by: Abba, Babakura
Published: (2014)
Efficient Entropy-Based Decoding
Algorithms For Higher-Order Hidden
Markov Model
by: Chan, Chin Tiong
Published: (2019)
by: Chan, Chin Tiong
Published: (2019)
Offline handwriting recognition using Artificial Neural Network and Hidden Markov Model
by: Tay, Yong Haur
Published: (2002)
by: Tay, Yong Haur
Published: (2002)
Malay continuous speech recognition using continuous density hidden Markov model
by: Ting, Chee Ming
Published: (2007)
by: Ting, Chee Ming
Published: (2007)
Similar Items
-
Structural features with nonnegative matrix factorization for metamorphic malware detection
by: Yeong, Tyng Ling, et al.
Published: (2021) -
Nonnegative matrix factorization and metamorphic malware detection
by: Ling, Yeong Tyng, et al.
Published: (2019) -
Short review on metamorphic malware detection in Hidden Markov Models
by: Yeong, T. Ling, et al.
Published: (2017) -
Hidden Markov models: an insight
by: Mohd Yusoff, Mohd Izhan, et al.
Published: (2014) -
Extracting features for the linguistic variables of fuzzy rules using hidden Markov model
by: Suliman, Azizah, et al.
Published: (2007)