2021
DOI: 10.1002/int.22451
|View full text |Cite
|
Sign up to set email alerts
|

Boosting training for PDF malware classifier via active learning

Abstract: Machine learning algorithms are widely used for cybersecurity applications, include spam, malware detection. In these applications, the machine learning model has to face attack by adversarial samples.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 30 publications
0
15
0
Order By: Relevance
“…This hybrid method integrates an arbitrary forest and DL technique utilizing 12 hidden layers for determining malware and benign files correspondingly. Li et al [12] projected an active-learning based malware detection method, utilizing mutual agreement analysis for choosing the uncertain instance as data augmentation. The detector was retrain based on the ground truth of uncertain instances before the entire test instances from the preceding epoch that is not only enhancing the detection performance, then also decreasing the trained time utilization of detectors.…”
Section: Related Workmentioning
confidence: 99%
“…This hybrid method integrates an arbitrary forest and DL technique utilizing 12 hidden layers for determining malware and benign files correspondingly. Li et al [12] projected an active-learning based malware detection method, utilizing mutual agreement analysis for choosing the uncertain instance as data augmentation. The detector was retrain based on the ground truth of uncertain instances before the entire test instances from the preceding epoch that is not only enhancing the detection performance, then also decreasing the trained time utilization of detectors.…”
Section: Related Workmentioning
confidence: 99%
“…Including spatial information and utilizing super-pixel and object based methods have been proposed to deal with the first difficulty 14 16 . The use of semi-supervised approaches and active learning are among the suggested methods to deal with the second difficulty 17 19 . An online active extreme learning machine (OA-ELM) has been proposed in 17 , which its aim is to improve training efficiency, classification accuracy and also the generalization ability.…”
Section: Introductionmentioning
confidence: 99%
“…The use of semi-supervised approaches and active learning are among the suggested methods to deal with the second difficulty 17 19 . An online active extreme learning machine (OA-ELM) has been proposed in 17 , which its aim is to improve training efficiency, classification accuracy and also the generalization ability. Support vector machine (SVM) can be an appropriate classifier when limited training samples are available 20 .…”
Section: Introductionmentioning
confidence: 99%
“…[7][8][9] Some of these solutions [10][11][12] are quite feasible, as they build CTCs by adjusting the timing behavior of legitimate channels, such as controlling resource consumption rates or managing packet delivery schedules in predefined time windows. [13][14][15][16] Covert timing channels have been explored in multiple ways especially over traditional Ethernet, and different efficient solutions have been proposed. Cabuk et al 17 proposed an internet protocol covert timing channel (IPCTC) and explored different design issues.…”
Section: Introductionmentioning
confidence: 99%