Harisha Airbail, G. Mamatha, Rahul V. Hedge, P. R. Sushmika, Reshma Kumari, K. Sandeep
{"title":"基于深度学习的恶意软件分类方法","authors":"Harisha Airbail, G. Mamatha, Rahul V. Hedge, P. R. Sushmika, Reshma Kumari, K. Sandeep","doi":"10.1504/IJIDSS.2021.115226","DOIUrl":null,"url":null,"abstract":"Any program that exhibit furtive demonstrations against the interests of the PC client can be considered as a malware. These baleful programs can play out varieties of different capacities, for example, taking, encoding, or erasing dainty information, changing or commandeering centre processing capacities, and examining clients' computer action without their consent. Today, malware is utilised by both governments and black hat hackers, to take individual, financial, or business data. In this paper, put forward a strategy for arranging malware utilising profound learning procedures. Malware binaries are pictured as greyscale pictures, with the perception that for some malware families, the pictures having a place with a similar family show up fundamentally the same as in surface and design. A standard picture highlights grouping strategy is proposed. The exploratory outcomes give 97.45% arrangement classification on a malware database of 9,339 examples with 25 diverse malware families.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Deep learning-based approach for malware classification\",\"authors\":\"Harisha Airbail, G. Mamatha, Rahul V. Hedge, P. R. Sushmika, Reshma Kumari, K. Sandeep\",\"doi\":\"10.1504/IJIDSS.2021.115226\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Any program that exhibit furtive demonstrations against the interests of the PC client can be considered as a malware. These baleful programs can play out varieties of different capacities, for example, taking, encoding, or erasing dainty information, changing or commandeering centre processing capacities, and examining clients' computer action without their consent. Today, malware is utilised by both governments and black hat hackers, to take individual, financial, or business data. In this paper, put forward a strategy for arranging malware utilising profound learning procedures. Malware binaries are pictured as greyscale pictures, with the perception that for some malware families, the pictures having a place with a similar family show up fundamentally the same as in surface and design. A standard picture highlights grouping strategy is proposed. The exploratory outcomes give 97.45% arrangement classification on a malware database of 9,339 examples with 25 diverse malware families.\",\"PeriodicalId\":311979,\"journal\":{\"name\":\"Int. J. Intell. Def. Support Syst.\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-05-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Intell. Def. Support Syst.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJIDSS.2021.115226\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Intell. Def. Support Syst.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJIDSS.2021.115226","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Deep learning-based approach for malware classification
Any program that exhibit furtive demonstrations against the interests of the PC client can be considered as a malware. These baleful programs can play out varieties of different capacities, for example, taking, encoding, or erasing dainty information, changing or commandeering centre processing capacities, and examining clients' computer action without their consent. Today, malware is utilised by both governments and black hat hackers, to take individual, financial, or business data. In this paper, put forward a strategy for arranging malware utilising profound learning procedures. Malware binaries are pictured as greyscale pictures, with the perception that for some malware families, the pictures having a place with a similar family show up fundamentally the same as in surface and design. A standard picture highlights grouping strategy is proposed. The exploratory outcomes give 97.45% arrangement classification on a malware database of 9,339 examples with 25 diverse malware families.