2021
DOI: 10.1016/j.cose.2021.102273
|View full text |Cite
|
Sign up to set email alerts
|

A novel few-shot malware classification approach for unknown family recognition with multi-prototype modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…Eliminating redundant APIs from malware API sequences has proven effective [ 29 , 30 , 31 , 32 ]. Our research used the following three commonly used methods to remove duplicate calls.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Eliminating redundant APIs from malware API sequences has proven effective [ 29 , 30 , 31 , 32 ]. Our research used the following three commonly used methods to remove duplicate calls.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…They achieved a very high accuracy and concluded that their method is universal and robust in detecting malware variants in network environments. Wang et al (2021) proposed a meta-learning based few-shot learning technique to classify novel malware families. They use API invocation sequences from dynamic analysis of malware.…”
Section: Malware Detection/classification Using Few-shot Learningmentioning
confidence: 99%
“…Scarcity of malware samples for malware families is a major problem when it comes to the domain of malware classification ( Wang et al, 2021 ). Training a traditional malware classifier requires a large amount of data.…”
Section: Few-shot Classification Modelsmentioning
confidence: 99%
“…Images depicting malware assaults, such as spear-phishing attacks, were used in another study to describe the timeline of the attack, with colors indicating which sorts of system connections were successful [ 27 ]. However, applying only one feature is insufficient for effective real-world malware detection or classification context since malware writers' obfuscation tactics may obscure a feature utilized in the machine learning model.…”
Section: Related Workmentioning
confidence: 99%