scispace - formally typeset
M

M. A. Ajay Kumara

Researcher at National Institute of Technology, Karnataka

Publications -  9
Citations -  127

M. A. Ajay Kumara is an academic researcher from National Institute of Technology, Karnataka. The author has contributed to research in topics: Malware & Hypervisor. The author has an hindex of 5, co-authored 9 publications receiving 82 citations. Previous affiliations of M. A. Ajay Kumara include Amrita Vishwa Vidyapeetham.

Papers
More filters
Journal ArticleDOI

Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor

TL;DR: This paper proposed an advanced VMM-based, guest-assisted Automated Internal-and-External (A-IntExt) introspection system by leveraging VMI, Memory Forensics Analysis (MFA), and machine learning techniques at the hypervisor, which outperforms the detection of real-world malware at the VMM with performance exceeding 6.3%.
Journal ArticleDOI

Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM

TL;DR: An advanced VMM-based guest-assisted Automated Multilevel Malware Detection System (AMMDS) that leverages both VMI and Memory Forensic Analysis (MFA) techniques to predict early symptoms of malware execution by detecting stealthy hidden processes on a live guest OS.
Journal ArticleDOI

Experimental analysis of Android malware detection based on combinations of permissions and API-calls

TL;DR: There is a need for an effective Android malware detection approach using the static features of the Android applications such as Standard Permissions with Application Programming Interface (API) calls, Non-standard Permission with API-calls, APIs with Standard and Nonstandard Permissions, and the Kullback-Leibler (KL) classifier.
Proceedings ArticleDOI

Windows malware detection based on cuckoo sandbox generated report using machine learning algorithm

TL;DR: A comprehensive experiment was conducted to perceive the best fit classifier among the chosen classifiers, including the Bayesian-Logistic-Regression, SPegasos, IB1, Bagging, Part, and J48 defined within the WEKA tool, and the overall best performance goes to SPegAsos with the highest accuracy, highest True Positive Rate (TPR), and lowest False positive Rate (FPR).
Book ChapterDOI

API Call Based Malware Detection Approach Using Recurrent Neural Network—LSTM

TL;DR: Recurrent Neural Network’s (RNN) capability to capture long-term features of time-series and sequential data is used to study the scope and effectiveness of RNNs to efficiently detect and analyze malware and benign based on their behaviour, i.e. system call sequences specifically.