2020
DOI: 10.1016/j.cose.2020.101740
|View full text |Cite
|
Sign up to set email alerts
|

Byte-level malware classification based on markov images and deep learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
51
0
2

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 131 publications
(53 citation statements)
references
References 7 publications
0
51
0
2
Order By: Relevance
“…In order to increase the accuracy of the CNN, authors in [20] used Markov images with the CNN instead of gray images. Therefore, the malware samples were converted to Markov images before training the CNN.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to increase the accuracy of the CNN, authors in [20] used Markov images with the CNN instead of gray images. Therefore, the malware samples were converted to Markov images before training the CNN.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore, we can say that processing the dataset in different ways while using the same classifier method result in various classification accuracy. This is evident since the authors in [18,19] and [20] used the same method, which was CNN; however, different techniques of processing datasets were applied. In [18], the malware samples were converted to grayscale images.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Venkatraman, Alazab & Vinayakumar (2019) proposed a hybrid architecture method based on CNN and gated recurrent unit (GRU) to classify malware images. Yuan et al (2020) converte malware binaries into markov images according to bytes transfer probability matrixs. Then the deep CNN is used for markov images classification.…”
Section: Introductionmentioning
confidence: 99%
“…However, most of the existing visualization schemes (Nataraj et al, 2011a;Nataraj et al, 2011b;Han et al, 2015;Cui et al, 2018;Venkatraman, Alazab & Vinayakumar, 2019;Yuan et al, 2020;Ghouti & Imam, 2020;Chu, Liu & Zhu, 2020) convert the whole portable executable (PE) format binary malware file into an image and the feature information contained in the image is typically contained in the global structure of the file. The code segment image only takes a small part of the whole malware image, and is a compiled "black box feature", which leads to the neglect of the specific semantic information contained in the code segment.…”
Section: Introductionmentioning
confidence: 99%