Structural features with nonnegative matrix factorization for metamorphic malware detection
Metamorphic malware is well known for evading signature-based detection by exploiting various code obfuscation techniques. Current metamorphic malware detection approaches require some prior knowledge during feature engineering stage to extract patterns and behaviors from malware. In this paper, we...
| Main Authors: | Yeong, Tyng Ling, Mohd Sani, Nor Fazlida, Abdullah, Mohd. Taufik, Abdul Hamid, Nor Asilah Wati |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier Advanced Technology
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/95181/ http://psasir.upm.edu.my/id/eprint/95181/1/Structural%20features%20with%20nonnegative%20matrix%20factorization%20for%20metamorphic%20malware%20detection.pdf |
Similar Items
Nonnegative matrix factorization and metamorphic malware detection
by: Ling, Yeong Tyng, et al.
Published: (2019)
by: Ling, Yeong Tyng, et al.
Published: (2019)
Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
by: Ling, Yeong Tyng, et al.
Published: (2021)
by: Ling, Yeong Tyng, et al.
Published: (2021)
Short review on metamorphic malware detection in Hidden Markov Models
by: Yeong, T. Ling, et al.
Published: (2017)
by: Yeong, T. Ling, et al.
Published: (2017)
Bio-inspired for Features Optimization and Malware Detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
Evaluation of feature selection algorithm for android malware detection
by: Mazlan, Nurul Hidayah, et al.
Published: (2018)
by: Mazlan, Nurul Hidayah, et al.
Published: (2018)
Android malware detection with ensemble of androidmanifest features
by: Mohammad Salehi, .
Published: (2019)
by: Mohammad Salehi, .
Published: (2019)
Comparative analysis and how efficient deep learning methods of malware detection
by: Mustapha, Norwati, et al.
Published: (2024)
by: Mustapha, Norwati, et al.
Published: (2024)
Effects of Time and Frequency Resolution on Nonnegative Matrix Factorization
by: Sophea, Seng, et al.
Published: (2007)
by: Sophea, Seng, et al.
Published: (2007)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
An efficient nonnegative matrix factorization approach in flexible Kernel space
by: Zhang, D., et al.
Published: (2009)
by: Zhang, D., et al.
Published: (2009)
Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics
by: Ahmad, Firdaus, et al.
Published: (2017)
by: Ahmad, Firdaus, et al.
Published: (2017)
Applying Bayesian probability for Android malware detection using permission features
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
by: Sharfah Ratibah, Tuan Mat, et al.
Published: (2021)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024)
by: Kadhum, Laith M., et al.
Published: (2024)
Automated feature selection using boruta algorithm to detect mobile malware
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
Parameter selection for nonnegative l1 matrix/tensor sparse decomposition
by: Wang, Y., et al.
Published: (2015)
by: Wang, Y., et al.
Published: (2015)
A matrix factorization framework for jointly analyzing multiple nonnegative data
by: Gupta, Sunil, et al.
Published: (2011)
by: Gupta, Sunil, et al.
Published: (2011)
Analysis of known and unknown malware bypassing techniques
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
Determining a Suitable Desired Factors for Nonnegative Matrix Factorization in Polyphonic Music Transcription
by: Sophea, Seng, et al.
Published: (2007)
by: Sophea, Seng, et al.
Published: (2007)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
by: Sarvari, Samira, et al.
Published: (2020)
by: Sarvari, Samira, et al.
Published: (2020)
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
Challenges in high accuracy of malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Convolutional long short-term memory for fileless malware detection
by: Kareegalan, Kunaprasan, et al.
Published: (2025)
by: Kareegalan, Kunaprasan, et al.
Published: (2025)
The largest eigenvalue of nonnegative tensors
by: Ibrahim, Nur Fadhilah
Published: (2013)
by: Ibrahim, Nur Fadhilah
Published: (2013)
Spectral theory of nonnegative tensors
by: Yang, Q., et al.
Published: (2013)
by: Yang, Q., et al.
Published: (2013)
Malware detection using static analysis in android: A review of FeCO (features, classification, and obfuscation)
by: Rosmalissa, Jusoh, et al.
Published: (2021)
by: Rosmalissa, Jusoh, et al.
Published: (2021)
Android mobile malware detection model based on permission features using machine learning approach
by: Sharfah Ratibah, Tuan Mat
Published: (2022)
by: Sharfah Ratibah, Tuan Mat
Published: (2022)
Machine Learning Malware Detection For Android
by: Amir Muhammad Hafiz, Othman
Published: (2022)
by: Amir Muhammad Hafiz, Othman
Published: (2022)
Android mobile malware detection using Fuzzy AHP
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Regularised nonnegative shared subspace learning
by: Gupta, Sunil, et al.
Published: (2011)
by: Gupta, Sunil, et al.
Published: (2011)
Coefficient Conditions for Starlikeness of Nonnegative Order
by: M. Ali, Rosihan, et al.
Published: (2012)
by: M. Ali, Rosihan, et al.
Published: (2012)
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
Malware Detection In Android Using Machine Learning
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
Review of hybrid analysis technique for malware detection
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
SCARECROW: scalable malware reporting, detection and analysis
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
Similar Items
-
Nonnegative matrix factorization and metamorphic malware detection
by: Ling, Yeong Tyng, et al.
Published: (2019) -
Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
by: Ling, Yeong Tyng, et al.
Published: (2021) -
Short review on metamorphic malware detection in Hidden Markov Models
by: Yeong, T. Ling, et al.
Published: (2017) -
Bio-inspired for Features Optimization and Malware Detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2018) -
Evaluation of feature selection algorithm for android malware detection
by: Mazlan, Nurul Hidayah, et al.
Published: (2018)