Comparative Analysis of LSTM, One-Class SVM, and PCA to Monitor Real-Time Malware Threats Using System Call Sequences and Virtual Machine Introspection

[1]  Real-time deep virtual machine introspection and its applications , 2014 .

[2]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.

[3]  D. B. Choksi,et al.  IMPLEMENTATION OF PROCESS FORENSIC FOR SYSTEM CALLS , 2014 .

[4]  Qinghua Zhang,et al.  MetaAware: Identifying Metamorphic Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[5]  P. Suresh Kumar,et al.  Fuzzy-Based Integration of Security and Trust in Distributed Computing , 2017, SocProS.

[6]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[7]  Christopher Krügel,et al.  A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.

[8]  Himanshu Upadhyay,et al.  Evaluation of IoT Data Visualization Tools and Techniques , 2020 .

[9]  P. Suresh Kumar,et al.  Performance analysis of machine learning algorithms on diabetes dataset using big data analytics , 2017, 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS).

[10]  Andrew H. Sung,et al.  Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[11]  Thomas Stibor,et al.  A supervised topic transition model for detecting malicious system call sequences , 2011, KDMS '11.

[12]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[13]  Qiang Chen,et al.  Probabilistic techniques for intrusion detection based on computer audit data , 2001, IEEE Trans. Syst. Man Cybern. Part A.

[14]  Jiankun Hu,et al.  A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns , 2014, IEEE Transactions on Computers.

[15]  Ralf C. Staudemeyer,et al.  Applying long short-term memory recurrent neural networks to intrusion detection , 2015 .

[16]  P. Suresh Kumar,et al.  Predictive Big Data Analytics in Healthcare , 2016, 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT).

[17]  S.S. Iyengar,et al.  Learning-Based Model to Fight against Fake Like Clicks on Instagram Posts , 2019, 2019 SoutheastCon.

[18]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[19]  Jennia Hizver,et al.  Real-time deep virtual machine introspection and its applications , 2014, VEE '14.

[20]  Ralf C. Staudemeyer,et al.  Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data , 2013, SAICSIT '13.

[21]  Himanshu Upadhyay,et al.  File integrity monitoring tools: Issues, challenges, and solutions , 2020, Concurr. Comput. Pract. Exp..

[22]  Bernhard Schölkopf,et al.  Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.

[23]  Yoshua Bengio,et al.  Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.

[24]  Himanshu Upadhyay,et al.  Deep learning approach to detect malicious attacks at system level: poster , 2019, WiSec.

[25]  Christopher Krügel,et al.  Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[26]  Philip K. Chan,et al.  Detecting novel attacks by identifying anomalous network packet headers , 2001 .

[27]  Shekhar Bhansali,et al.  Health Monitoring with Low Power IoT Devices using Anomaly Detection Algorithm , 2019, 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC).

[28]  Vasant Honavar,et al.  Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation , 2005, ISI.

[29]  Ajay Chaudhary,et al.  Cloud Based Wireless Infrastructure for Health Monitoring , 2020, Virtual and Mobile Healthcare.

[30]  Dae-Ki Kang,et al.  Learning classifiers for misuse and anomaly detection using a bag of system calls representation , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[31]  Himanshu Upadhyay,et al.  Natural Language Processing based Anomalous System Call Sequences Detection with Virtual Memory Introspection , 2020 .