2021
DOI: 10.13052/jcsm2245-1439.1036
|View full text |Cite
|
Sign up to set email alerts
|

API Call-Based Malware Classification Using Recurrent Neural Networks

Abstract: Malicious software, called malware, can perform harmful actions on computer systems, which may cause economic damage and information leakage. Therefore, malware classification is meaningful and required to prevent malware attacks. Application programming interface (API) call sequences are easily observed and are good choices as features for malware classification. However, one of the main issues is how to generate a suitable feature for the algorithms of classification to achieve a high classification accuracy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 29 publications
(30 reference statements)
0
9
0
Order By: Relevance
“…Their pioneering work underscores the substantial accomplishments attained through the integration of deep learning techniques within API-sequence-based malware classification. In the same way, C Li's work [20] also demonstrates the RNN's ability to classify the API call sequences alone. In a subsequent development, Li et al [21] have further refined the network architecture, introducing the extraction of inherent features from API sequences.…”
Section: Deep Learning-based or Api-call-related Malware Classificationmentioning
confidence: 82%
See 1 more Smart Citation
“…Their pioneering work underscores the substantial accomplishments attained through the integration of deep learning techniques within API-sequence-based malware classification. In the same way, C Li's work [20] also demonstrates the RNN's ability to classify the API call sequences alone. In a subsequent development, Li et al [21] have further refined the network architecture, introducing the extraction of inherent features from API sequences.…”
Section: Deep Learning-based or Api-call-related Malware Classificationmentioning
confidence: 82%
“…The first five methods are classic methods [14,[44][45][46][47] to do the malware family classification, and we report the results from their papers. The following five methods [16,20,21,23,48] are the latest effective work on the classification based on API calls, so we reproduce the methods and offer a convincing comparison result. The [21] method adopts a two-way feature extraction architecture for API calls, but the core module is a multi-layer CNN, and the correlation analysis is performed through Bi-LSTM.…”
Section: Comparison With Previous Methodsmentioning
confidence: 99%
“…The benchmark dataset was imbalanced in some malware families, such as Adware and Spyware. Hence, accuracy evaluation was not enough to identify the best classifier and make fair comparisons with other research [28,30]; the same evaluation metrics, precision, recall, and F1 score were used to present the results.…”
Section: Resultsmentioning
confidence: 99%
“…RNN is highly efficient at processing time series sequences, especially in the natural language processing field. Li et al [28] presented a classification model for malware families using the RNN model. Long API call sequences are used as classification features for variants of malware.…”
Section: Related Workmentioning
confidence: 99%
“…Eliminating redundant APIs from malware API sequences has proven effective [ 29 , 30 , 31 , 32 ]. Our research used the following three commonly used methods to remove duplicate calls.…”
Section: Proposed Methodsmentioning
confidence: 99%