{"title":"基于深度学习技术的恶意软件分类研究综述","authors":"E. Vani, P. Prabhavathy","doi":"10.1109/AISC56616.2023.10085625","DOIUrl":null,"url":null,"abstract":"Information technology is emerging at fast phase in present environment. The main concerns for a cyber-attack are Privacy and Security. New malwares are increasing at a very fast rate, according to studies. The war between the attackers and security concerns are needed to protect the system from dangerous and malicious software is a continuous process. Attackers are constantly attempting to avoid Malicious malware signatures that are generally being developed by antivirus vendors. Deep learning architectures are used in cyber security applications to examine the essential properties of sample. Also, emerging DL (Deep Learning) techniques and resources identifies the disadvantages in the current work that is used to represent an image of the current trends in the area, that is also used to provide insights and provide the researchers and developers with the best practices that work on similar issues.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"344 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Survey on Malware Classification using Deep Learning Techniques\",\"authors\":\"E. Vani, P. Prabhavathy\",\"doi\":\"10.1109/AISC56616.2023.10085625\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information technology is emerging at fast phase in present environment. The main concerns for a cyber-attack are Privacy and Security. New malwares are increasing at a very fast rate, according to studies. The war between the attackers and security concerns are needed to protect the system from dangerous and malicious software is a continuous process. Attackers are constantly attempting to avoid Malicious malware signatures that are generally being developed by antivirus vendors. Deep learning architectures are used in cyber security applications to examine the essential properties of sample. Also, emerging DL (Deep Learning) techniques and resources identifies the disadvantages in the current work that is used to represent an image of the current trends in the area, that is also used to provide insights and provide the researchers and developers with the best practices that work on similar issues.\",\"PeriodicalId\":408520,\"journal\":{\"name\":\"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)\",\"volume\":\"344 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AISC56616.2023.10085625\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AISC56616.2023.10085625","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey on Malware Classification using Deep Learning Techniques
Information technology is emerging at fast phase in present environment. The main concerns for a cyber-attack are Privacy and Security. New malwares are increasing at a very fast rate, according to studies. The war between the attackers and security concerns are needed to protect the system from dangerous and malicious software is a continuous process. Attackers are constantly attempting to avoid Malicious malware signatures that are generally being developed by antivirus vendors. Deep learning architectures are used in cyber security applications to examine the essential properties of sample. Also, emerging DL (Deep Learning) techniques and resources identifies the disadvantages in the current work that is used to represent an image of the current trends in the area, that is also used to provide insights and provide the researchers and developers with the best practices that work on similar issues.