Krithik Gopinath, Mayaluri Tejaswi, Hritesh J, Thirumagal E
{"title":"恶意软件分析中机器学习算法的比较研究","authors":"Krithik Gopinath, Mayaluri Tejaswi, Hritesh J, Thirumagal E","doi":"10.1109/ICAAIC56838.2023.10141134","DOIUrl":null,"url":null,"abstract":"Comparing various machine learning algorithms on malware analysis is the process of evaluating the performance of different algorithms by using a dataset of labeled malware samples. The process includes training multiple models using algorithms such as XG-Boost, Random Forest, Naive Bayes, and k-NN and comparing their performance using various metrics like precision-recall, accuracy, and F1-score. The best algorithm for a given problem will rely upon the characteristics of the dataset and the requirements of the application. This process can help to develop an algorithm suitable for a specific problem and dataset to optimize the overall performance of the malware detection system.","PeriodicalId":267906,"journal":{"name":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Comparative Study of Machine Learning Algorithms for Malware Analysis\",\"authors\":\"Krithik Gopinath, Mayaluri Tejaswi, Hritesh J, Thirumagal E\",\"doi\":\"10.1109/ICAAIC56838.2023.10141134\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Comparing various machine learning algorithms on malware analysis is the process of evaluating the performance of different algorithms by using a dataset of labeled malware samples. The process includes training multiple models using algorithms such as XG-Boost, Random Forest, Naive Bayes, and k-NN and comparing their performance using various metrics like precision-recall, accuracy, and F1-score. The best algorithm for a given problem will rely upon the characteristics of the dataset and the requirements of the application. This process can help to develop an algorithm suitable for a specific problem and dataset to optimize the overall performance of the malware detection system.\",\"PeriodicalId\":267906,\"journal\":{\"name\":\"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)\",\"volume\":\"172 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAAIC56838.2023.10141134\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAAIC56838.2023.10141134","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comparative Study of Machine Learning Algorithms for Malware Analysis
Comparing various machine learning algorithms on malware analysis is the process of evaluating the performance of different algorithms by using a dataset of labeled malware samples. The process includes training multiple models using algorithms such as XG-Boost, Random Forest, Naive Bayes, and k-NN and comparing their performance using various metrics like precision-recall, accuracy, and F1-score. The best algorithm for a given problem will rely upon the characteristics of the dataset and the requirements of the application. This process can help to develop an algorithm suitable for a specific problem and dataset to optimize the overall performance of the malware detection system.