2016
DOI: 10.1007/978-3-319-50127-7_11
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning for Classification of Malware System Call Sequences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
198
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 332 publications
(199 citation statements)
references
References 19 publications
1
198
0
Order By: Relevance
“…These neural models respond aptly to the criticality of our problem. The model which combines a CNN followed by an LSTM proposed by Kolosnjaji, et al [21] performed better than DSL in terms of average accuracy, but had a significantly lower performance in TPR@1% and the best case ROC curve. Our experiments with AOLL display comparable performance to LAMP [25,2], highlighting the ability of end-to-end models to identify optimal gradient flow even when using multiple loss functions, but also signifying the effectiveness of a single loss function optimizing the entire model end-to-end.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…These neural models respond aptly to the criticality of our problem. The model which combines a CNN followed by an LSTM proposed by Kolosnjaji, et al [21] performed better than DSL in terms of average accuracy, but had a significantly lower performance in TPR@1% and the best case ROC curve. Our experiments with AOLL display comparable performance to LAMP [25,2], highlighting the ability of end-to-end models to identify optimal gradient flow even when using multiple loss functions, but also signifying the effectiveness of a single loss function optimizing the entire model end-to-end.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…Hierarchical clustering methodologies have been proposed for malware clustering especially where the number of centroid is unknown. Kolosnjaji uses cosine distance and DBSCAN to detect regions of high similarities. Other hierarchical clustering such as Agglomerative Clustering is also used for clustering malware according to its family with the help of activity tree.…”
Section: Related Workmentioning
confidence: 99%
“…In the recent development, Deep learning such as autoencoder has grown in popularity among the machine learning arena. Researchers such as Kolosnjaji et al uses convolutional and recurrent network to obtain the best feature set. AE provides a good solution to the clustering problem .…”
Section: Related Workmentioning
confidence: 99%
“…There has recently been some work on deep learning based malware classification which does not require feature engineering. However, existing deep learning approaches do not leverage the information from already-available dynamic analysis systems, instead tending to pick one type of dynamic feature [14] or use static features [6]. These solutions miss out on the complete information concerning what actions are taken by each sample.…”
Section: Introductionmentioning
confidence: 99%