2017 International Joint Conference on Neural Networks (IJCNN) 2017
DOI: 10.1109/ijcnn.2017.7966340
|View full text |Cite
|
Sign up to set email alerts
|

Empowering convolutional networks for malware classification and analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(28 citation statements)
references
References 13 publications
0
28
0
Order By: Relevance
“…From a close look at the very recent applications using Deep Learning for solving malware classification challenges, we observed the followings: Observation 7.1: Features selected in malware classification were grouped into three categories: static features, dynamic features, and hybrid features. Typical static features include metadata, PE import Features, Byte/Entorpy, String, and Assembly Opcode Features derived from the PE files (Kolosnjaji et al 2017;McLaughlin et al 2017; Saxe and Berlin 2015). De La Rosa et al (2018) took three kinds of static features: byte-level, basic-level ( strings in the file, the metadata table, and the import table of the PE header), and assembly features-level.…”
Section: Key Findings From a Closer Lookmentioning
confidence: 99%
See 2 more Smart Citations
“…From a close look at the very recent applications using Deep Learning for solving malware classification challenges, we observed the followings: Observation 7.1: Features selected in malware classification were grouped into three categories: static features, dynamic features, and hybrid features. Typical static features include metadata, PE import Features, Byte/Entorpy, String, and Assembly Opcode Features derived from the PE files (Kolosnjaji et al 2017;McLaughlin et al 2017; Saxe and Berlin 2015). De La Rosa et al (2018) took three kinds of static features: byte-level, basic-level ( strings in the file, the metadata table, and the import table of the PE header), and assembly features-level.…”
Section: Key Findings From a Closer Lookmentioning
confidence: 99%
“…Observation 7.2: In most works, Phase II was inevitable because extracted features needed to be vertorized for Deep Learning models. One-hot encoding approach was frequently used to vectorize features (Kolosnjaji et al 2017;McLaughlin et al 2017;Rosenberg et al 2018;Tobiyama et al 2016;Nix and Zhang 2017). Bag-of-words (BoW) and n-gram were also considered to represent features (Nix and Zhang 2017).…”
Section: Key Findings From a Closer Lookmentioning
confidence: 99%
See 1 more Smart Citation
“…One model has been pretrained on word embedding whereas the other one is not pretrained. A convolutional FFN which employs hierarchical feature extraction mechanism to detect and classify malwares [264]. This approach is based on data from static analysis and uses meta data of portable executable files.…”
Section: ) Deep Neural Network (Dnn)mentioning
confidence: 99%
“…Jiang et al [14] proposed LSTM-RNN multi-channel voting algorithm, which improved the adaptability of neural network in different environments and expanded the application scenarios of detection algorithm. Kolosnjaji et al [15] proposed a traffic intrusion detection method based on convolution and feed-forward neural structure, which realized the extraction of hierarchical features of data sets. Zhou et al [16] summarized the collaborative intrusion detection systems to expand the deficiency of traditional IDS in detecting coordinated attacks.…”
Section: Related Workmentioning
confidence: 99%