Danger Theory Concepts Improving Malware Detection of Intrusion Detection Systems That Uses Exact Graphs

Author(s):  
Suhair Amer ◽  
Joshua Leonard
Author(s):  
Azuan Ahmad ◽  
Bharanidharan Shanmugam ◽  
Norbik Bashah Idris ◽  
Ganthan Nayarana Samy ◽  
Sameer Hasan AlBakri

Author(s):  
Ciprian Pungila ◽  
Viorel Negru

This chapter presents an outline of the challenges involved in constructing efficient malware detection engines using hybrid CPU/GPU-accelerated architectures and discusses how one can overcome such challenges. Starting with a general problem description for malware detection and moving on to the algorithmic background involved for solving it, the authors present a review of the existing approaches for detecting malware and discuss how such approaches may be improved through GPU-accelerated processing. They describe and discuss several hybrid hardware architectures built for detecting malicious software and outline the particular characteristics of each, separately, followed by a debate on their performance and most suitable application in real-world environments. Finally, the authors tackle the problem of performing real-time malware detection and present the most important aspects that need to be taken into account in intrusion detection systems.


Author(s):  
BalaGanesh D ◽  
Amlan Chakrabarti ◽  
Divya Midhunchakkaravarthy

In recent times, malware detection mechanism systems of mobile smart devices are getting growing concentration from researchers. With the quick expansion of malwares found in mobile devices, preventing the secrecy of mobile users is incredibly imperative and necessary. Intrusion detection systems are programming devices that consequently assemble information, dissect it and recognize such occurrences. These systems advanced to intrusion aversion systems (IPS) including extra counteractive action capacities.   In Intrusion detection systems, accuracy rate plays a significant role in measuring the effectiveness of an approach. One of the motivations of this study is to increase the true positive as well as reducing the false-positive rates beyond other studies.


2006 ◽  
Vol 65 (10) ◽  
pp. 929-936
Author(s):  
A. V. Agranovskiy ◽  
S. A. Repalov ◽  
R. A. Khadi ◽  
M. B. Yakubets

Sign in / Sign up

Export Citation Format

Share Document