Zou et al., 2022 - Google Patents
IMCLNet: A lightweight deep neural network for Image-based Malware ClassificationZou et al., 2022
- Document ID
- 5687257567587107718
- Author
- Zou B
- Cao C
- Tao F
- Wang L
- Publication year
- Publication venue
- Journal of Information Security and Applications
External Links
Snippet
With the increasing number of malware and advanced evasion technology, it is more and more difficult to detect malware accurately and efficiently. To solve this challenge, a feasible method is to convert malware into images, and then classify them by using the model based …
- 230000001537 neural 0 title abstract description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6256—Obtaining sets of training patterns; Bootstrap methods, e.g. bagging, boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/10—Bioinformatics, i.e. methods or systems for genetic or protein-related data processing in computational molecular biology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vasan et al. | IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture | |
Ni et al. | Malware identification using visualization images and deep learning | |
Naeem et al. | Identification of malicious code variants based on image visualization | |
Venkatraman et al. | A hybrid deep learning image-based analysis for effective malware detection | |
Chaganti et al. | Image-based malware representation approach with EfficientNet convolutional neural networks for effective malware classification | |
Chen | Deep transfer learning for static malware classification | |
Pajouh et al. | Intelligent OS X malware threat detection with code inspection | |
Chaganti et al. | A multi-view feature fusion approach for effective malware classification using Deep Learning | |
Naeem et al. | A light-weight malware static visual analysis for IoT infrastructure | |
Zou et al. | IMCLNet: A lightweight deep neural network for Image-based Malware Classification | |
Yuan et al. | IoT malware classification based on lightweight convolutional neural networks | |
Zegzhda et al. | Applying deep learning techniques for Android malware detection | |
Naeem et al. | A cross-platform malware variant classification based on image representation | |
Moreira et al. | Improving ransomware detection based on portable executable header using xception convolutional neural network | |
Shen et al. | Feature fusion-based malicious code detection with dual attention mechanism and BiLSTM | |
Ravi et al. | Attention‐based convolutional neural network deep learning approach for robust malware classification | |
Sharma et al. | Windows and IoT malware visualization and classification with deep CNN and Xception CNN using Markov images | |
Belal et al. | Global-local attention-based butterfly vision transformer for visualization-based malware classification | |
Ravi et al. | EfficientNet deep learning meta-classifier approach for image-based android malware detection | |
Roshan et al. | Deep learning approaches for anomaly and intrusion detection in computer network: A review | |
Kornish et al. | Malware classification using deep convolutional neural networks | |
Vasan et al. | Broad learning: A GPU-free image-based malware classification | |
Reilly et al. | Robustness of image-based malware classification models trained with generative adversarial networks | |
Ye et al. | Android malware detection technology based on lightweight convolutional neural networks | |
Vashishtha et al. | An Ensemble approach for advance malware memory analysis using Image classification techniques |