Essays about: "Malware Detection"

Showing result 1 - 5 of 40 essays containing the words Malware Detection.

  1. 1. Android Malware Detection Using Machine Learning

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Rahul Sai Kesani; [2024]
    Keywords : Malware; Machine Learning; Random Forest; Sequential Neural Network.;

    Abstract : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. READ MORE

  2. 2. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE

  3. 3. Masking revealing hardware attributes in the source code of a hypervisor : A study exploring strategies to hide the identity of virtual environments during malware analysis

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kevin Engström; Robin Lenz; [2023]
    Keywords : Sandbox detection; analysis evasion; virtual environment; masking;

    Abstract : Background: Malware is responsible for a significant part of the ever increasing cost of cyberattacks. Malware analysis is an important part in minimizing these costs. READ MORE

  4. 4. A command-and-control malware design using cloud covert channels : Revealing elusive covert channels with Microsoft Teams

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Massimo Bertocchi; [2023]
    Keywords : Covert channel; Command and Control; Microsoft Teams; Detection; Hemlig kanal; ledning och kontroll; Microsoft Teams; upptäckt;

    Abstract : With the rise of remote working, business communication platforms such as Microsoft Teams have become indispensable tools deeply ingrained in the workflow of every employee. However, their increasing importance have made the identification and analysis of covert channels a critical concern for both individuals and organizations. READ MORE

  5. 5. Evaluation of machine learning models for classifying malicious URLs

    University essay from Högskolan i Gävle/Datavetenskap

    Author : Shayan Abad; Hassan Gholamy; [2023]
    Keywords : Machine learning; Cyber security; Classification; Malicious URL; Instance selection;

    Abstract : Millions of new websites are created daily, making it challenging to determine which ones are safe. Cybersecurity involves protecting companies and users from cyberattacks. Cybercriminals exploit various methods, including phishing attacks, to trick users into revealing sensitive information. READ MORE