Mostrar el registro sencillo de la publicación
Detection of obfuscated malware by engineering memory functions applying ELM
dc.contributor.author | Moraga, Leonardo Igor | |
dc.contributor.author | Rivelli Malcó, Juan Pablo | |
dc.contributor.author | Zabala-Blanco, David | |
dc.contributor.author | Ahumada-García, Roberto | |
dc.contributor.author | Azurdia-Meza, Cesar A. | |
dc.contributor.author | Dehghan Firoozabadi, Ali | |
dc.date.accessioned | 2023-10-25T13:10:58Z | |
dc.date.available | 2023-10-25T13:10:58Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | http://repositorio.ucm.cl/handle/ucm/5040 | |
dc.description.abstract | Memory analysis is critical to detecting malicious processes, as it can capture various characteristics and behaviors. However, although it is a field in full research, there are still some major obstacles in malware detection, such as optimizing the detection rate and countering advanced malware obfuscation. Since advanced malware uses obfuscation and other techniques to hide from detection methods, there is a great need for an efficient framework that focuses on combating obfuscation and detecting hidden malware. This work proposes an extreme learning machine (ELM) trained with a database of viruses, classified into families of Trojans, spyware, and ransomware. The performance of different ELMs will be implemented and analyzed, among them, the standard ELM, regularized ELM, unbalanced ELM I and II. Its performance will be studied both in binary classification and in multiple classifications, in order to train an antivirus capable of combating the aforementioned difficulties. Prior to obtaining the results, the operating principle of these autonomous learning methods and the methodology to be followed are explained. Finally, the results obtained for each learning method are compared. | es_CL |
dc.language.iso | en | es_CL |
dc.rights | Atribución-NoComercial-SinDerivadas 3.0 Chile | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/cl/ | * |
dc.source | IEEE Colombian Conference on Applications of Computational Intelligence (ColCACI), 2023, 1-6 | es_CL |
dc.subject | Malware | es_CL |
dc.subject | Computer viruses | es_CL |
dc.subject | Viruses (medical) | es_CL |
dc.subject | Spyware | es_CL |
dc.subject | Ransomware | es_CL |
dc.subject | Trojan horses | es_CL |
dc.subject | Learning systems | es_CL |
dc.title | Detection of obfuscated malware by engineering memory functions applying ELM | es_CL |
dc.type | Article | es_CL |
dc.ucm.indexacion | Scopus | es_CL |
dc.ucm.uri | ieeexplore.ieee.org/document/10226058 | es_CL |
dc.ucm.doi | doi.org/10.1109/ColCACI59285.2023.10226058 | es_CL |
Ficheros en la publicación
Ficheros | Tamaño | Formato | Ver |
---|---|---|---|
No hay ficheros asociados a esta publicación. |