2022 5th International Conference on Signal Processing and Information Security (ICSPIS) 2022
DOI: 10.1109/icspis57063.2022.10002693
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Feature Extraction and Classification Techniques of PE Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Expanding upon our prior research efforts documented in [53,54], it is evident that the utilization of image-based features bestows advantages in the detection and categorization of malware within image and PE file formats. Hence, this study extends the previous approach by incorporating image transforms to develop a comprehensive classifier that is capable of detecting malicious files across different file types, including PDFs, Microsoft Office documents, and PE files.…”
Section: Feature Extraction Using Grayscale-based Image Transformsmentioning
confidence: 94%
See 1 more Smart Citation
“…Expanding upon our prior research efforts documented in [53,54], it is evident that the utilization of image-based features bestows advantages in the detection and categorization of malware within image and PE file formats. Hence, this study extends the previous approach by incorporating image transforms to develop a comprehensive classifier that is capable of detecting malicious files across different file types, including PDFs, Microsoft Office documents, and PE files.…”
Section: Feature Extraction Using Grayscale-based Image Transformsmentioning
confidence: 94%
“…This section provides a detailed description of the datasets used, feature engineering, and training process. It is worth noting that this work is a continuation of our prior research, including [53], which focuses on the categorization of malware within PE files, and [54], which concentrates on the distinction of malicious images.…”
Section: Methodsmentioning
confidence: 99%
“…Deep learning models, such as Deep Neural Networks (DNNs), known for their enhanced representation capabilities through depth, have been employed to improve fea-ture hierarchies, offering more abstraction in problem-solving [34,35,36]. Techniques like Opcode sequence analysis and RNN-Auto Encoders have been used for generating file access sequences, aiding in malware classification [37,38,39,40,41]. The role of deep learning in ransomware detection has been recognized, particularly in the efficient classification of zero-day ransomware variants.…”
Section: Ransomware Detectionmentioning
confidence: 99%