CYBER 101

  • Alerts
  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Join our newsletter

FOLLOW US

  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial

Machine Learning Methods for Malware Detection

by Kaspersky

1 min read
in Document, Report

Basic Approaches to Malware Detection:

An efficient, robust and scalable malware recognition module is the key component of every cybersecurity product. Malware recognition modules decide if an object is a threat, based on the data they have collected on it.

This data may be collected at different phases:

• Pre-execution phase data is anything you can tell about a file without executing it. This may include executable file format descriptions, code descriptions, binary data statistics, text strings and information extracted via code emulation and other similar data.

• Post-execution phase data conveys information about behavior or events caused by process activity in a system. In the early part of the cyber era, the number of malware threats was relatively low, and simple manually created pre-execution rules were often enough to detect threats.

The rapid rise of the Internet and the ensuing growth in malware meant that manually created detection rules were no longer practical – and new, advanced protection technologies were needed. Anti-malware companies turned to machine learning, an area of computer science that had been used successfully in image recognition, searching and decision making, to augment their malware detection and classification. Today, machine learning boosts malware detection using various kinds of data on host, network and cloud-based anti-malware components.

DOWNLOAD REPORT

Related

Tags: CybersecurityKasperskyLaspassmalware-documentsPsychology of passwords
2
VIEWS
ADVERTISEMENT

Related Posts

Cybersecurity: Incident Response Short Student Guide

Cybersecurity: Incident Response Short Student Guide

August 11, 2022
Cyber Security Incident Response Plan

Cyber Security Incident Response Plan

August 11, 2022
Sample Incident Handling Checklist

Sample Incident Handling Checklist

August 11, 2022
Incident Response Cheat Sheet

Incident Response Cheat Sheet

August 11, 2022

More Articles

How Walgreens’ sloppy Covid-19 test registration system exposed patient data

September 15, 2021
Alerts

[Control Systems] Hitachi Energy Security Advisory

December 8, 2021
Alerts

Citrix Releases Security Updates

June 15, 2022
Alerts

How to Patch Log4j Now That Version 2.16 Has Been Released

December 15, 2021

Cipher Podcast

May 31, 2022

Alt-coin

March 3, 2021
Course

Github Actions for DevSecOps

March 31, 2022
Incidents

Hacked WordPress sites force visitors to DDoS Ukrainian targets

March 29, 2022
Load More

Security through data

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
Search

More...

Generic filters
Filter by Categories
Alerts
Blog
Book
Incidents
Quotes
Tutorials
Certification
Cheat Sheet
Course
Game
Meme
Movie
Paper
Podcast
Report
Software
TV Show

Try these: DDoSGDPRMalware

  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Join our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.