2022
DOI: 10.51408/1963-0094
|View full text |Cite
|
Sign up to set email alerts
|

Research of Obfuscated Malware with a Capsule Neural Network

Abstract: The paper presents the results of a research of using transfer training of the capsule neural network to detect malware. The research was carried out on the basis of the source code of malware using the context-triggered piecewise hashing method. The source codes of malware were obtained from public sources of software. Verification of the capsule neural network learning results was carried out using a trained convolutional neural network, and publicly available sources of test to malware. The research was con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 9 publications
0
1
0
Order By: Relevance
“…Software implementing softmax is integrated into the convolutional neural network (CNN) that searches for malware (detailed in [5]) using the CTPH method). The change in softmax occurs according to the following scheme (Fig.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Software implementing softmax is integrated into the convolutional neural network (CNN) that searches for malware (detailed in [5]) using the CTPH method). The change in softmax occurs according to the following scheme (Fig.…”
Section: Methodsmentioning
confidence: 99%
“…To achieve the goal of preserving the previous state of the neural network, it is necessary to develop such a softmax type that, with the value of its output vector, the number of logits is constant. In this paper, research the use of datasets of malicious polymorphic software abc, cheeba, december_3, stasi, otario, dm, v-sign, tequila, flip detected by piecewise context hashing [5].…”
Section: Introductionmentioning
confidence: 99%
“…To increase the reliability of the results, the SDN using Hyper-V is displayed in a separate vlan (virtual local network, vlan). Quantitative and qualitative results were compared with the results obtained using the ssdeep software [27] and the methods proposed in [28][29], as well as with the virustotal service. The research scheme in SDN is presented in Fig.…”
Section: Terms and Definitionmentioning
confidence: 99%
“…It is necessary to detect a malicious dataset in normalized traffic. The mathematical model construction was carried out on the basis of the formulas obtained in the sources [16,17]. There are network traffic ๐‘‹ inputs that contain malware fragments (1).…”
Section: Formulation and Description The Problemmentioning
confidence: 99%
“…Similarly for the ๐‘– -th neighbor of the entity ๐œ in the dataset ๐‘ฆ ๐‘–;๐œ . Using the formula (3 from the source [17], we determine the malicious kNN components for the traffic arriving in the NI.…”
Section: Formulation and Description The Problemmentioning
confidence: 99%