All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Comprehensive approach to the detection and analysis of polymorphic malware

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F25840886%3A_____%2F24%3AN0000009" target="_blank" >RIV/25840886:_____/24:N0000009 - isvavai.cz</a>

  • Result on the web

    <a href="https://ceur-ws.org/Vol-3736/paper23.pdf" target="_blank" >https://ceur-ws.org/Vol-3736/paper23.pdf</a>

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Comprehensive approach to the detection and analysis of polymorphic malware

  • Original language description

    The article examines the features of modern polymorphic malware and its impact on the functioning of computer systems. Existing approaches and methods of its detection and analysis are considered, such as: string search algorithm, intelligent data analysis, sandbox analysis, machine learning, structural feature engineering. Their advantages and disadvantages are determined. The necessity of using a new approach, namely the detection of malicious software using probabilistic logical networks, is argued. Its advantages and development prospects are determined. In the study, a comprehensive approach consisting of 3 stages is proposed for the detection of polymorphic malware. The first one uses string search algorithms. The second is a complex of methods, including intelligent data analysis, sandbox analysis, machine learning, and structural feature engineering. In the third step, the use of probabilistic logical networks is proposed, which will allow establishing the probability that the software belongs to polymorphic malware. The use of the proposed integrated approach will also allow to determine the necessary methods for neutralization of detected malicious software. This approach will maximize the probability of detecting polymorphic malware.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    20202 - Communication engineering and systems

Result continuities

  • Project

  • Continuities

    N - Vyzkumna aktivita podporovana z neverejnych zdroju

Others

  • Publication year

    2024

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    2024 1st International Workshop on Intelligent and CyberPhysical Systems

  • ISBN

  • ISSN

    1613-0073

  • e-ISSN

  • Number of pages

    12

  • Pages from-to

    312-323

  • Publisher name

    CEUR

  • Place of publication

    Khmelnytskyi, Ukraine

  • Event location

    Khmelnytskyi, Ukraine

  • Event date

    Jun 28, 2024

  • Type of event by nationality

    EUR - Evropská akce

  • UT code for WoS article