Comparative Analysis of LSTM, One-Class SVM, and PCA to Monitor Real-Time Malware Threats Using System Call Sequences and Virtual Machine Introspection
暂无分享,去创建一个
Himanshu Upadhyay | Nagarajan Prabakar | Suresh K. Peddoju | Jayesh Soni | Himanshu Upadhyay | Jayesh Soni | N. Prabakar
[1] Real-time deep virtual machine introspection and its applications , 2014 .
[2] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[3] D. B. Choksi,et al. IMPLEMENTATION OF PROCESS FORENSIC FOR SYSTEM CALLS , 2014 .
[4] Qinghua Zhang,et al. MetaAware: Identifying Metamorphic Malware , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[5] P. Suresh Kumar,et al. Fuzzy-Based Integration of Security and Trust in Distributed Computing , 2017, SocProS.
[6] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[7] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[8] Himanshu Upadhyay,et al. Evaluation of IoT Data Visualization Tools and Techniques , 2020 .
[9] P. Suresh Kumar,et al. Performance analysis of machine learning algorithms on diabetes dataset using big data analytics , 2017, 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS).
[10] Andrew H. Sung,et al. Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[11] Thomas Stibor,et al. A supervised topic transition model for detecting malicious system call sequences , 2011, KDMS '11.
[12] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[13] Qiang Chen,et al. Probabilistic techniques for intrusion detection based on computer audit data , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[14] Jiankun Hu,et al. A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns , 2014, IEEE Transactions on Computers.
[15] Ralf C. Staudemeyer,et al. Applying long short-term memory recurrent neural networks to intrusion detection , 2015 .
[16] P. Suresh Kumar,et al. Predictive Big Data Analytics in Healthcare , 2016, 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT).
[17] S.S. Iyengar,et al. Learning-Based Model to Fight against Fake Like Clicks on Instagram Posts , 2019, 2019 SoutheastCon.
[18] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[19] Jennia Hizver,et al. Real-time deep virtual machine introspection and its applications , 2014, VEE '14.
[20] Ralf C. Staudemeyer,et al. Evaluating performance of long short-term memory recurrent neural networks on intrusion detection data , 2013, SAICSIT '13.
[21] Himanshu Upadhyay,et al. File integrity monitoring tools: Issues, challenges, and solutions , 2020, Concurr. Comput. Pract. Exp..
[22] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[23] Yoshua Bengio,et al. Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.
[24] Himanshu Upadhyay,et al. Deep learning approach to detect malicious attacks at system level: poster , 2019, WiSec.
[25] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[26] Philip K. Chan,et al. Detecting novel attacks by identifying anomalous network packet headers , 2001 .
[27] Shekhar Bhansali,et al. Health Monitoring with Low Power IoT Devices using Anomaly Detection Algorithm , 2019, 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC).
[28] Vasant Honavar,et al. Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation , 2005, ISI.
[29] Ajay Chaudhary,et al. Cloud Based Wireless Infrastructure for Health Monitoring , 2020, Virtual and Mobile Healthcare.
[30] Dae-Ki Kang,et al. Learning classifiers for misuse and anomaly detection using a bag of system calls representation , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[31] Himanshu Upadhyay,et al. Natural Language Processing based Anomalous System Call Sequences Detection with Virtual Memory Introspection , 2020 .