2020
DOI: 10.1109/access.2020.3022722
|View full text |Cite
|
Sign up to set email alerts
|

A Malware Detection Method of Code Texture Visualization Based on an Improved Faster RCNN Combining Transfer Learning

Abstract: Today, with the continuous promotion and development of IoT and 5G technology, Cyberspace has become an important pillar of economic and social development, and also a foundational domain of national security. Cyberspace security is attracting more and more attention. Therefore, detecting malware and its variants is of great significance to Cyberspace. However, the increasing sophistication of malicious variants, such as encryption, polymorphism and obfuscation, makes it more difficult to identified malware ef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 19 publications
0
17
0
Order By: Relevance
“…Accuracy Recall Precision F1-Score BIRCH [17] 95.02% 90.2% 95.2% 92.3% DART [28] 93.9% 91.2% 89.8% 90.0% GAA-ADS [39] 92.8% 91.3% --RCNN+Transfer Learning [40] 92 We also make a comparison between our work with some existing domain adaptation-based methods such as BIRCH [17], DART [28], GAA-ADS [39], and RCNN+ transfer learning [40], which are shown in Table 3. Our method obtains a higher accuracy and recall than the GAA-ADS and RCNN + transfer learning.…”
Section: Methodsmentioning
confidence: 99%
“…Accuracy Recall Precision F1-Score BIRCH [17] 95.02% 90.2% 95.2% 92.3% DART [28] 93.9% 91.2% 89.8% 90.0% GAA-ADS [39] 92.8% 91.3% --RCNN+Transfer Learning [40] 92 We also make a comparison between our work with some existing domain adaptation-based methods such as BIRCH [17], DART [28], GAA-ADS [39], and RCNN+ transfer learning [40], which are shown in Table 3. Our method obtains a higher accuracy and recall than the GAA-ADS and RCNN + transfer learning.…”
Section: Methodsmentioning
confidence: 99%
“…The subsequent steps involve usage of various imaging technologies. In this aspect, various methods have been investigated, including textural method [5]. The recent development in DL has also attracted the application in malware detection mainly due to its ability self-generate features for classification.…”
Section: Volume 2020mentioning
confidence: 99%
“…Nataraj et al [33] first proposed to visualize malware binaries as grayscale images and classify malware according to the similarity of image textures. Some researchers refer to the processing methods of images of different sizes in the image field, and use deformation processing such as cutting or scaling to convert malicious code images to a fixed size [52]; however, these methods will cause the loss of malicious code data and the destruction of code structure. This paper utilized the method to visualize malicious code, which converts binary code into three-channel image as Wang et al did in their paper [49].…”
Section: Transforming Malware Byte Files Into Imagesmentioning
confidence: 99%