Proceedings of the 2015 Conference of the International Fuzzy Systems Association and the European Society for Fuzzy Logic and 2015
DOI: 10.2991/ifsa-eusflat-15.2015.27
|View full text |Cite
|
Sign up to set email alerts
|

A new method of fuzzy patches construction in Neuro-Fuzzy for malware detection

Abstract: Soft Computing is being widely used in Information Security applications. Particularly, Neuro-Fuzzy approach provides a classification with humanunderstandable rules, yet the accuracy may not be sufficiently high. In this paper we seek for an optimal fuzzy patch configuration that uses elliptic fuzzy patches to automatically extract parameters for the Mamdami-type rules. We proposed a new method based on χ 2 test of data to estimate rotatable patch configuration together with Gaussian membership function. This… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…Both datasets in [5], [22] are relatively small in scale. [4], [21], [33] explored the application of the neuro-fuzzy approach with static features to detect Android malware and to classify Windows malware, during which a variational procedure is adopted to better fuzzify the features. Although [33] reported the application of the fuzzy system to a large dataset (ten repositories from Virus Share, over 130K malware samples), the overall classification accuracy is relatively low compared with non-fuzzy methods such as random forest.…”
Section: Classifiers For Malware Classificationmentioning
confidence: 99%
See 2 more Smart Citations
“…Both datasets in [5], [22] are relatively small in scale. [4], [21], [33] explored the application of the neuro-fuzzy approach with static features to detect Android malware and to classify Windows malware, during which a variational procedure is adopted to better fuzzify the features. Although [33] reported the application of the fuzzy system to a large dataset (ten repositories from Virus Share, over 130K malware samples), the overall classification accuracy is relatively low compared with non-fuzzy methods such as random forest.…”
Section: Classifiers For Malware Classificationmentioning
confidence: 99%
“…Fuzzy rules, which has been widely applied in cybernetics [34]- [36], malware detection [21] as well as classification [33], [37], [38], is one of the most representative fuzzy based classifiers. For a feature vector…”
Section: Classifiers For Malware Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Neuro-Fuzzy is a hybrid models that ensembles neural networks and fuzzy logic to create human-like linguistic rules using the power of neural networks. Neural network also known as artificial neural network is a network of simple elements which are based on the model of perceptron [65]. Perceptron implements previously chosen activation functions which take input signals and their weights and produces an output, usually in the range of [0, 1] or [−1, 1].…”
Section: Rule Basedmentioning
confidence: 99%
“…However, much higher frequency in case of probabilist model suppresses less frequent cases, while fuzzy logic describes data independently from the frequency of its appearance, only taking into consideration its possibility as described before by Shalaginov et.al. [125].…”
Section: Quantitative Risk Analysismentioning
confidence: 99%