IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Machine Learning for Malware Analysis: Methods, Challenges, and Future Directions

Machine Learning for Malware Analysis: Methods, Challenges, and Future Directions
View Sample PDF
Author(s): Krishna Yadav (National Institute of Technology, Kurukshetra, India), Aarushi Sethi (National Institute of Technology, Kurukshetra, India), Mavneet Kaur (National Institute of Technology, Kurukshetra, India)and Dragan Perakovic (University of Zagreb, Croatia)
Copyright: 2022
Pages: 18
Source title: Advances in Malware and Data-Driven Network Security
Source Author(s)/Editor(s): Brij B. Gupta (National Institute of Technology, Kurukshetra, India)
DOI: 10.4018/978-1-7998-7789-9.ch001

Purchase

View Machine Learning for Malware Analysis: Methods, Challenges, and Future Directions on the publisher's website for pricing and purchasing information.

Abstract

Companies and organizations are collecting all sorts of data ranging from nominal feedback like customer reviews to highly classified data like medical records. With data being such a critical aspect of most of the operations around us, cybercriminals are looking for an opportunity to misuse this information. One such device that cybercriminals use to further their malicious intent is malware. Over the years, these cybercriminals have become immensely powerful using the knowledge of previous attacks. Hence, malware analysis and methods to troubleshoot the problems arising due to malware attacks is the need of the hour. Over time, different new approaches have been developed to defend malware. However, in recent times, machine learning-based malware analysis has gained popularity. The capacity to detect possible future malware by learning from existing malware patterns makes this method very popular. In this chapter, the authors have introduced different malware and the machine learning-based approach that has been developed in recent times to mitigate malware.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom