2018 International Conference on Information Networking (ICOIN) 2018
DOI: 10.1109/icoin.2018.8343255
|View full text |Cite
|
Sign up to set email alerts
|

Flow-based malware detection using convolutional neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 56 publications
(21 citation statements)
references
References 4 publications
0
21
0
Order By: Relevance
“…Convolutional Neural Networks (CNNs), a specific DL technique, have grown in popularity in recent times leading to major innovations in computer vision [6]- [8] and Natural Language Processing [9], as well as various niche areas such as protein binding prediction [10], [11], machine vibration analysis [12] and medical signal processing [13]. Whilst their use is still under-researched in cybersecurity generally, the application of CNNs has advanced the state-of-the-art in certain specific scenarios such as malware detection [14]- [17], code analysis [18], network traffic analysis [4], [19]- [21] and intrusion detection in industrial control systems [22]. These successes, combined with the benefits of CNN with respect to reduced feature engineering and high detection accuracy, motivate us to employ CNNs in our work.…”
Section: Introductionmentioning
confidence: 99%
“…Convolutional Neural Networks (CNNs), a specific DL technique, have grown in popularity in recent times leading to major innovations in computer vision [6]- [8] and Natural Language Processing [9], as well as various niche areas such as protein binding prediction [10], [11], machine vibration analysis [12] and medical signal processing [13]. Whilst their use is still under-researched in cybersecurity generally, the application of CNNs has advanced the state-of-the-art in certain specific scenarios such as malware detection [14]- [17], code analysis [18], network traffic analysis [4], [19]- [21] and intrusion detection in industrial control systems [22]. These successes, combined with the benefits of CNN with respect to reduced feature engineering and high detection accuracy, motivate us to employ CNNs in our work.…”
Section: Introductionmentioning
confidence: 99%
“…Signatures can match the characteristic malware content [89], network protocols and packet payloads [90], but they can also identify suspicious behavior [91], [92], being an effective method for detecting well-known malware. The use of metadata [93] and connection attributes [94] made it possible to define new features and increase the level of efficiency enabling the detection of malicious network traffic. In addition, new signature types such as JA3/JA3S have added new capabilities to the signature-based engines, allowing the detection of threats in encrypted traffic [95].…”
Section: A Signature-based Methodsmentioning
confidence: 99%
“…The semi-supervised method obtained an accuracy of 86% in [599], whereas others achieved 95.9% accuracy with SVM [595]. SVM was further used for malware detection in [600,601]. Authors in [602] proposed a new method with an accuracy of 97.95% to detect unknown malware.…”
Section: ) Techniques and Methodsmentioning
confidence: 99%