Malware Classification using Deep Learning Technique

Olufikayo Olowoyo, P. Owolawi
{"title":"Malware Classification using Deep Learning Technique","authors":"Olufikayo Olowoyo, P. Owolawi","doi":"10.1109/IMITEC50163.2020.9334071","DOIUrl":null,"url":null,"abstract":"The increasing dependency of humans on computers for data storage and the internet for connectivity has paved way for cybercriminals, who are leveraging on this growing number for their personal benefits. This has resulted in the creation of countless malwares with the sole aim of malicious attack. In this study, focus is on the use of deep learning technique for the classification of malware into their respective family or author of origin. The approach used in this study involves transforming malwares, obtained as Portable Executables, into their corresponding image representation. The images generated are then used as dataset for our model which uses transfer learning approach. Our implemented model was deemed successful as we were able to obtain a higher average classification accuracy of 98.8% when evaluated with other techniques from previous literature.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMITEC50163.2020.9334071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

The increasing dependency of humans on computers for data storage and the internet for connectivity has paved way for cybercriminals, who are leveraging on this growing number for their personal benefits. This has resulted in the creation of countless malwares with the sole aim of malicious attack. In this study, focus is on the use of deep learning technique for the classification of malware into their respective family or author of origin. The approach used in this study involves transforming malwares, obtained as Portable Executables, into their corresponding image representation. The images generated are then used as dataset for our model which uses transfer learning approach. Our implemented model was deemed successful as we were able to obtain a higher average classification accuracy of 98.8% when evaluated with other techniques from previous literature.
基于深度学习技术的恶意软件分类
人们越来越依赖电脑来存储数据,越来越依赖互联网来连接网络,这为网络犯罪分子铺平了道路,他们利用这一不断增长的数字来谋取个人利益。这导致了无数恶意软件的产生,其唯一目的是恶意攻击。在本研究中,重点是使用深度学习技术将恶意软件分类到各自的家族或来源。本研究中使用的方法包括将作为可移植可执行文件获得的恶意软件转换为相应的图像表示。然后将生成的图像用作我们使用迁移学习方法的模型的数据集。我们实现的模型被认为是成功的,因为当与以前文献中的其他技术进行评估时,我们能够获得更高的平均分类准确率98.8%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信