2019
DOI: 10.1142/s0219649219500424
|View full text |Cite
|
Sign up to set email alerts
|

Malware Detection Using Optimized Activation-Based Deep Belief Network: An Application on Internet of Things

Abstract: Number of malware detection models has been proposed recently, which still poses major limitations in terms of detection rate. Hence, to overcome this, this paper introduces a new malware detection model with three stages: Feature Extraction, Feature selection and Classification. In feature extraction phase, the Term Frequency-Inverse Document Frequency (TF-IDF) and Information gain (IG) features are extracted. More importantly, the IG feature is subjected with the Holoentropy evaluation. Following the feature… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 38 publications
0
1
0
Order By: Relevance
“…As machine learning methods, such as support vector machine (SVM), extreme learning machine (ELM), neural network (NN), have shown good achievements on classification tasks, there has been a surge of interest in machine learning methods on edge malware detection in recent years. In [29], Sagar developed a three-stage malware detection model to improve detection performance. Term frequency-inverse document frequency (TF-IDF) and information gain (IG) features were extracted in the first stage, and then principal component analysis (PCA) technique was brought in for feature extraction.…”
Section: Machine Learning Methods On Edge Malware Detection and Categmentioning
confidence: 99%
“…As machine learning methods, such as support vector machine (SVM), extreme learning machine (ELM), neural network (NN), have shown good achievements on classification tasks, there has been a surge of interest in machine learning methods on edge malware detection in recent years. In [29], Sagar developed a three-stage malware detection model to improve detection performance. Term frequency-inverse document frequency (TF-IDF) and information gain (IG) features were extracted in the first stage, and then principal component analysis (PCA) technique was brought in for feature extraction.…”
Section: Machine Learning Methods On Edge Malware Detection and Categmentioning
confidence: 99%