2022
DOI: 10.1007/s11416-022-00416-3
|View full text |Cite
|
Sign up to set email alerts
|

ConRec: malware classification using convolutional recurrence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…By transforming malware binaries into grayscale images, and employing CNNs, the proposed method achieved the impressive accuracy of 97.4%. Mallik et al [50] utilized convolutional recurrence with grayscale images, BiLSTM layers, data augmentation, and convolutional neural networks, achieving the remarkable accuracy of 98.36% in malware classification. K Gupta et al [51] utilized an artificial neural network architecture to precisely classify malware variants, effectively tackling the challenges posed by obfuscation and compression techniques.…”
Section: Related Workmentioning
confidence: 99%
“…By transforming malware binaries into grayscale images, and employing CNNs, the proposed method achieved the impressive accuracy of 97.4%. Mallik et al [50] utilized convolutional recurrence with grayscale images, BiLSTM layers, data augmentation, and convolutional neural networks, achieving the remarkable accuracy of 98.36% in malware classification. K Gupta et al [51] utilized an artificial neural network architecture to precisely classify malware variants, effectively tackling the challenges posed by obfuscation and compression techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Effectively expanding the network's informational pool is Bi-LSTM technology. Mallik A et al [16] retrieved features are processed by the BiLSTM layers, who then improve them to disclose hidden traits of the structural identities in the malware samples. Processing the derived features of an image depends on BiLSTM's ability to process the inputs consecutively.…”
Section: Recurrent Neural Network (Rnn)mentioning
confidence: 99%
“…When it comes to military usage of malware, we may see more events like Stuxnet in the future. It remains to be seen how antivirus firms will cope with attackers with almost unlimited resources to create malware and those motivated only by profit [ 44 , 45 ]. However, with occurrences like Stuxnet, we may see alternative uses for malware in the future and malware classification evolution is shown in Figure 1 .…”
Section: Related Workmentioning
confidence: 99%