Nothing Special   »   [go: up one dir, main page]

Zou et al., 2022 - Google Patents

IMCLNet: A lightweight deep neural network for Image-based Malware Classification

Zou et al., 2022

Document ID
5687257567587107718
Author
Zou B
Cao C
Tao F
Wang L
Publication year
Publication venue
Journal of Information Security and Applications

External Links

Snippet

With the increasing number of malware and advanced evasion technology, it is more and more difficult to detect malware accurately and efficiently. To solve this challenge, a feasible method is to convert malware into images, and then classify them by using the model based …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6256Obtaining sets of training patterns; Bootstrap methods, e.g. bagging, boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/10Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models

Similar Documents

Publication Publication Date Title
Vasan et al. IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture
Ni et al. Malware identification using visualization images and deep learning
Naeem et al. Identification of malicious code variants based on image visualization
Venkatraman et al. A hybrid deep learning image-based analysis for effective malware detection
Chaganti et al. Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification
Chen Deep transfer learning for static malware classification
Pajouh et al. Intelligent OS X malware threat detection with code inspection
Chaganti et al. A multi-view feature fusion approach for effective malware classification using Deep Learning
Naeem et al. A light-weight malware static visual analysis for IoT infrastructure
Zou et al. IMCLNet: A lightweight deep neural network for Image-based Malware Classification
Yuan et al. IoT malware classification based on lightweight convolutional neural networks
Zegzhda et al. Applying deep learning techniques for Android malware detection
Naeem et al. A cross-platform malware variant classification based on image representation
Moreira et al. Improving ransomware detection based on portable executable header using xception convolutional neural network
Shen et al. Feature fusion-based malicious code detection with dual attention mechanism and BiLSTM
Ravi et al. Attention‐based convolutional neural network deep learning approach for robust malware classification
Sharma et al. Windows and IoT malware visualization and classification with deep CNN and Xception CNN using Markov images
Belal et al. Global-local attention-based butterfly vision transformer for visualization-based malware classification
Ravi et al. EfficientNet deep learning meta-classifier approach for image-based android malware detection
Roshan et al. Deep learning approaches for anomaly and intrusion detection in computer network: A review
Kornish et al. Malware classification using deep convolutional neural networks
Vasan et al. Broad learning: A GPU-free image-based malware classification
Reilly et al. Robustness of image-based malware classification models trained with generative adversarial networks
Ye et al. Android malware detection technology based on lightweight convolutional neural networks
Vashishtha et al. An Ensemble approach for advance malware memory analysis using Image classification techniques