2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN) 2019
DOI: 10.1109/icscan.2019.8878696
|View full text |Cite
|
Sign up to set email alerts
|

Identification of malware using CNN and bio-inspired technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…rough the above experiments, it can be seen that the malware visualization method introduced in this study is better than the methods in [17,23], etc. And its generalization ability is good.…”
Section: Discussionmentioning
confidence: 74%
See 1 more Smart Citation
“…rough the above experiments, it can be seen that the malware visualization method introduced in this study is better than the methods in [17,23], etc. And its generalization ability is good.…”
Section: Discussionmentioning
confidence: 74%
“…And they found out the one with the best performance among the three algorithms is RF. Poonguzhali et al [17] proposed to combine convolutional neural network and intelligent optimization algorithm for malware image detection and achieved high detection accuracy. Many research based on visualization technology has been implemented in computer malware detection, but few on Android malware detection.…”
Section: Introductionmentioning
confidence: 99%
“…Methodologies such as Genetic Algorithms (GA) [122], Particle Swarm Optimization (PSO) [123] and Ant Colony Optimization (ACO) [124]) are now used for feature selection and optimization for solving problems ranging from the detection of malware in Android OS to the improvement of intrusion detection systems. Unfortunately, to be efficiently deployed to production-quality scenarios, the bio-inspired methods require facing several problems, such as solving the imbalance of a dataset [125], tuning the configurations of neural network models [126], as well as finding the optimal combination of parameters while avoiding the problem of falling into local optimal solution [127]. However, GA algorithms demonstrated their capability for obtaining a strong generalization ability and robustness by finding the best learner group for ensemble models [128].…”
Section: E Bio-inspired and Other Detection Methodsmentioning
confidence: 99%
“…The DL approach can ma ke cybersecurity much simpler by detecting various threats. The authors of Poonguzhali, et al [16] studied the method of revealing malicious software using convolutional neural networks (CNN). The dangerous code was transformed into grey-scaled images and classified with CNN, reaching an accuracy score of about 94.01%.…”
Section: Related Workmentioning
confidence: 99%