2021
DOI: 10.1109/tfuzz.2020.3016023
|View full text |Cite
|
Sign up to set email alerts
|

Large-Scale Malicious Software Classification With Fuzzified Features and Boosted Fuzzy Random Forest

Abstract: Classification of malicious software, especially in a very large dataset, is a challenging task for machine intelligence. Malware can have highly diversified features, each of which has highly heterogeneous distributions. These factors increase the difficulties for traditional data analytic approaches to deal with them. Although deep learning-based methods have reported good classification performance, the deep models usually lack interpretability and are fragile under adversarial attacks. To solve these probl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 49 publications
0
1
0
1
Order By: Relevance
“…Особливо це актуально при ідентифікації стану КС, оскільки тут існує чимало факторів, які важко передбачити. Цей недолік можна зменшити, застосовуючи нейронні мережі, теорію нечітких множин та відповідне програмне забезпечення [16].…”
Section: вступunclassified
“…Особливо це актуально при ідентифікації стану КС, оскільки тут існує чимало факторів, які важко передбачити. Цей недолік можна зменшити, застосовуючи нейронні мережі, теорію нечітких множин та відповідне програмне забезпечення [16].…”
Section: вступunclassified
“…Similar methods that utilize Learning-Based Generative Model for PDF files [16], Concept Drift Detection with Sequential Deep Learning (CDS SDL) for batch malwares [17], Fuzzified Features with Boosted Fuzzy Random Forest (FBRF) [18], and RNN for visualization of malwares [19] are discussed by researchers. These models aim at improving inter-class feature variance via rigorous analysis of extracted features in order to identify malwarespecific models that can be deployed for on-field use cases.…”
Section: Literature Reviewmentioning
confidence: 99%