Publication: Obfuscated Malware Detection: Impacts on Detection Methods
dc.citedby | 2 | |
dc.contributor.author | Gorment N.Z. | en_US |
dc.contributor.author | Selamat A. | en_US |
dc.contributor.author | Krejcar O. | en_US |
dc.contributor.authorid | 57201987388 | en_US |
dc.contributor.authorid | 24468984100 | en_US |
dc.contributor.authorid | 14719632500 | en_US |
dc.date.accessioned | 2024-10-14T03:20:00Z | |
dc.date.available | 2024-10-14T03:20:00Z | |
dc.date.issued | 2023 | |
dc.description.abstract | Obfuscated malware poses a challenge to traditional malware detection methods as it uses various techniques to disguise its behavior and evade detection. This paper focuses on the impacts of obfuscated malware detection techniques using a variety of detection methods. Furthermore, this paper discusses the current state of obfuscated malware, the methods used to detect it, and the limitations of those methods. The impact of obfuscation on the effectiveness of detection methods is also discussed. An approach for the creation of advanced detection techniques based on machine learning algorithms is offered, along with an empirical examination of malware detection performance assessment to battle obfuscated malware. Overall, this paper highlights the importance of staying ahead of the constantly evolving threat landscape to safeguard computer networks and systems. � 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG. | en_US |
dc.description.nature | Final | en_US |
dc.identifier.doi | 10.1007/978-3-031-42430-4_5 | |
dc.identifier.epage | 66 | |
dc.identifier.scopus | 2-s2.0-85174520622 | |
dc.identifier.spage | 55 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85174520622&doi=10.1007%2f978-3-031-42430-4_5&partnerID=40&md5=1e32964a2c9b0db3f8a96fed253f8537 | |
dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/34469 | |
dc.identifier.volume | 1863 CCIS | |
dc.pagecount | 11 | |
dc.publisher | Springer Science and Business Media Deutschland GmbH | en_US |
dc.source | Scopus | |
dc.sourcetitle | Communications in Computer and Information Science | |
dc.subject | Machine leaning algorithm | |
dc.subject | Malware detection | |
dc.subject | Obfuscated malware | |
dc.subject | Learning algorithms | |
dc.subject | Malware | |
dc.subject | 'current | |
dc.subject | Advanced detections | |
dc.subject | Detection methods | |
dc.subject | Effectiveness of detection methods | |
dc.subject | Machine leaning | |
dc.subject | Machine leaning algorithm | |
dc.subject | Malware detection | |
dc.subject | Malwares | |
dc.subject | Obfuscated malware | |
dc.subject | On-machines | |
dc.subject | Machine learning | |
dc.title | Obfuscated Malware Detection: Impacts on Detection Methods | en_US |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |