{"title":"研究了基于卷积神经网络的多态恶意软件检测模型","authors":"Timur Jamgharyan","doi":"10.56243/18294898-2023.3-10","DOIUrl":null,"url":null,"abstract":"The paper presents the results of research on the use of a convolutional neural network to detect polymorphic malware. The research was conducted on on basis of polymorphic software abc, cheeba, december_3, stasi, otario, dm, v-sign, tequila, flip. The generated of datasets for training a convolutional neural network was carried out using «state matrices» of various dimensions. The Fadeev-Leverrier method was used as a mathematical apparatus. The simulation of the developed software at different iterations and visualization of the results was carried out.","PeriodicalId":472444,"journal":{"name":"BULLETIN OF HIGH TECHNOLOGY","volume":"79 S49","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"RESEARCH THE MODEL OF DETECTION POLYMORPHIC MALWARE BY THE CONVOLUTIONAL NEURAL NETWORK\",\"authors\":\"Timur Jamgharyan\",\"doi\":\"10.56243/18294898-2023.3-10\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper presents the results of research on the use of a convolutional neural network to detect polymorphic malware. The research was conducted on on basis of polymorphic software abc, cheeba, december_3, stasi, otario, dm, v-sign, tequila, flip. The generated of datasets for training a convolutional neural network was carried out using «state matrices» of various dimensions. The Fadeev-Leverrier method was used as a mathematical apparatus. The simulation of the developed software at different iterations and visualization of the results was carried out.\",\"PeriodicalId\":472444,\"journal\":{\"name\":\"BULLETIN OF HIGH TECHNOLOGY\",\"volume\":\"79 S49\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"BULLETIN OF HIGH TECHNOLOGY\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.56243/18294898-2023.3-10\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"BULLETIN OF HIGH TECHNOLOGY","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.56243/18294898-2023.3-10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
RESEARCH THE MODEL OF DETECTION POLYMORPHIC MALWARE BY THE CONVOLUTIONAL NEURAL NETWORK
The paper presents the results of research on the use of a convolutional neural network to detect polymorphic malware. The research was conducted on on basis of polymorphic software abc, cheeba, december_3, stasi, otario, dm, v-sign, tequila, flip. The generated of datasets for training a convolutional neural network was carried out using «state matrices» of various dimensions. The Fadeev-Leverrier method was used as a mathematical apparatus. The simulation of the developed software at different iterations and visualization of the results was carried out.