2018
DOI: 10.1007/978-3-319-77028-4_9
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Software Classification Using VGG16 Deep Neural Network’s Bottleneck Features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
66
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 94 publications
(68 citation statements)
references
References 6 publications
0
66
0
2
Order By: Relevance
“…Table 4 shows the results of our method compared with the four combination models: GIST+KNN, LBP+KNN, GIST+DSIFT+KNN, VGG16(fine-tune). We can see that our method has achieved [25] combined deep learning and transfer learning algorithms to achieve a higher classification accuracy of malware classification. However, our method (MESRF) still improved the classification accuracy rate by 1% and achieved a better classification performance.…”
Section: E Compared With Other Malware Classification Methodsmentioning
confidence: 84%
See 2 more Smart Citations
“…Table 4 shows the results of our method compared with the four combination models: GIST+KNN, LBP+KNN, GIST+DSIFT+KNN, VGG16(fine-tune). We can see that our method has achieved [25] combined deep learning and transfer learning algorithms to achieve a higher classification accuracy of malware classification. However, our method (MESRF) still improved the classification accuracy rate by 1% and achieved a better classification performance.…”
Section: E Compared With Other Malware Classification Methodsmentioning
confidence: 84%
“…To validate the effectiveness and efficiency of the proposed method, we compared our method with four other malware classification methods [3], [6], [24], [25] that use the structural features of malware. Each of the methods extracts the structural features (texture features) from the raw bytes of the malware, and then applied machine learning algorithms (e.g.…”
Section: E Compared With Other Malware Classification Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Rezende et al [8] introduced a malware detection method using pre-trained VGG16, one of well-known deep learning models for object detection. They first extracted features from the bottleneck layer of VGG16, trained by Im-ageNet dataset, and then trained a SVM classifer with the extracted features to detect malwares.…”
Section: Related Workmentioning
confidence: 99%
“…However, our model is specialized for handling binary image data. For example, in our convolution layers, the kernel size and stride size are the multiplies of power of two (i.e., (16,64), (8,8), (8,32), (16,16)) not conventional odd numbers (e.g., (3,3) or (5,5)). Since an executable file format strictly follows byte alignment, the choice of the multiplies of power of two at kernel size and stride size will prevent from disrupting byte alignment during training.…”
Section: Architecturementioning
confidence: 99%