A learning model to detect maliciousness of portable executable using integrated feature set

Discussion in 'other security issues & news' started by itman, Jul 23, 2017.

  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    An interesting research paper for those interested in AI/Next Gen malware detection methods.

    Summarized as follows:
    http://www.sciencedirect.com/science/article/pii/S1319157817300149
     
    Last edited by a moderator: Jul 23, 2017
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Of note is that although signatures are not directly employed by the AI/Next Gen products, they are very much used in the "conditioning" phase of their respective detection engines.

    This provokes the question of what happens if AV signatures and the products that use them were to no longer exist? Would the AI/Next Gen engines be as effective?
     
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Perhaps Dan from VoodooShield will find this interesting, but it really looks too complex for me.

    I think you will always need to have signatures, but AI will become more and more important. False positives should also be considered, I've read that this is the biggest problem with Cylance.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.