2019
DOI: 10.1016/j.compeleceng.2019.06.014
|View full text |Cite
|
Sign up to set email alerts
|

Long short-term memory-based Malware classification method for information security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(27 citation statements)
references
References 10 publications
0
27
0
Order By: Relevance
“…In addition, to verify that the numeric vectors from pre-trained Word2Vec model are capable to represent the malware feature sequences more precisely, the current popular one-hot encoding technique combined with TCN (OneHotTCN, for short) is compared in our experiments. Then, our proposed scheme (Word2VecTCN, for short) is compared with the state-of-the-art malware categorization model in [34] (Word2VecLSTM, for short). Finally, our scheme is compared with some other recent works on the same malware dataset.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, to verify that the numeric vectors from pre-trained Word2Vec model are capable to represent the malware feature sequences more precisely, the current popular one-hot encoding technique combined with TCN (OneHotTCN, for short) is compared in our experiments. Then, our proposed scheme (Word2VecTCN, for short) is compared with the state-of-the-art malware categorization model in [34] (Word2VecLSTM, for short). Finally, our scheme is compared with some other recent works on the same malware dataset.…”
Section: Methodsmentioning
confidence: 99%
“…• Unify the sequence length: Samples with various length are tricky for neural networks, and therefore unifying the sequence length is imperative for malware categorization. In this work, a sequence length L is pre-set to equalize the lengths [34]. The sequences with length longer than L retain the first L names, and those shorter than L are unified via zero-padding.…”
Section: Pre-processingmentioning
confidence: 99%
“…In addition, the authors evaluated a variety of machine-learning-based and deep-learning-based algorithms that utilize static analysis, dynamic and image processing methods for malware detection systems. Moreover, Kang et al [32] utilized opcodes and API function names to classify malicious files into families using a word2vec model and LSTM networks. In [33], Xiao et al proposed a detection method based on two LSTM models utilizing semantic information to classify the system call sequence.…”
Section: Intelligence-based Methodsmentioning
confidence: 99%
“…MsM2015 The MsM2015 dataset has been extensively used in literature for malware classification tasks. For example, the work by Kang et al [19] uses word-to-vec approach with an LSTM network to classify the samples in each family. As many other studies on this subject, they do not consider the binary as is but rather generate an assembly file for each sample and collect opcodes and API functions that will then constitute the bulk of the features utilized.…”
Section: Related Workmentioning
confidence: 99%