基于深度学习技术的恶意软件分类研究综述

E. Vani, P. Prabhavathy
{"title":"基于深度学习技术的恶意软件分类研究综述","authors":"E. Vani, P. Prabhavathy","doi":"10.1109/AISC56616.2023.10085625","DOIUrl":null,"url":null,"abstract":"Information technology is emerging at fast phase in present environment. The main concerns for a cyber-attack are Privacy and Security. New malwares are increasing at a very fast rate, according to studies. The war between the attackers and security concerns are needed to protect the system from dangerous and malicious software is a continuous process. Attackers are constantly attempting to avoid Malicious malware signatures that are generally being developed by antivirus vendors. Deep learning architectures are used in cyber security applications to examine the essential properties of sample. Also, emerging DL (Deep Learning) techniques and resources identifies the disadvantages in the current work that is used to represent an image of the current trends in the area, that is also used to provide insights and provide the researchers and developers with the best practices that work on similar issues.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"344 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Survey on Malware Classification using Deep Learning Techniques\",\"authors\":\"E. Vani, P. Prabhavathy\",\"doi\":\"10.1109/AISC56616.2023.10085625\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information technology is emerging at fast phase in present environment. The main concerns for a cyber-attack are Privacy and Security. New malwares are increasing at a very fast rate, according to studies. The war between the attackers and security concerns are needed to protect the system from dangerous and malicious software is a continuous process. Attackers are constantly attempting to avoid Malicious malware signatures that are generally being developed by antivirus vendors. Deep learning architectures are used in cyber security applications to examine the essential properties of sample. Also, emerging DL (Deep Learning) techniques and resources identifies the disadvantages in the current work that is used to represent an image of the current trends in the area, that is also used to provide insights and provide the researchers and developers with the best practices that work on similar issues.\",\"PeriodicalId\":408520,\"journal\":{\"name\":\"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)\",\"volume\":\"344 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AISC56616.2023.10085625\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AISC56616.2023.10085625","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在当前环境下,信息技术正处于快速发展阶段。网络攻击的主要关注点是隐私和安全。研究表明,新的恶意软件正在以非常快的速度增长。攻击者和安全问题之间的战争需要保护系统免受危险和恶意软件是一个持续的过程。攻击者经常试图避开通常由反病毒厂商开发的恶意软件签名。深度学习架构在网络安全应用中用于检查样本的基本属性。此外,新兴的DL(深度学习)技术和资源确定了当前工作中的缺点,这些缺点用于表示该领域当前趋势的图像,也用于提供见解,并为研究人员和开发人员提供解决类似问题的最佳实践。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Survey on Malware Classification using Deep Learning Techniques
Information technology is emerging at fast phase in present environment. The main concerns for a cyber-attack are Privacy and Security. New malwares are increasing at a very fast rate, according to studies. The war between the attackers and security concerns are needed to protect the system from dangerous and malicious software is a continuous process. Attackers are constantly attempting to avoid Malicious malware signatures that are generally being developed by antivirus vendors. Deep learning architectures are used in cyber security applications to examine the essential properties of sample. Also, emerging DL (Deep Learning) techniques and resources identifies the disadvantages in the current work that is used to represent an image of the current trends in the area, that is also used to provide insights and provide the researchers and developers with the best practices that work on similar issues.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信