2021
DOI: 10.1109/access.2021.3131713
|View full text |Cite
|
Sign up to set email alerts
|

Vision-Based Malware Detection: A Transfer Learning Approach Using Optimal ECOC-SVM Configuration

Abstract: Malware detection in current times is increasingly important due to the presence of dangerous malicious software (malware) as well as ransomware in digital cyberspace. Conventional approaches such as using malware features (either static or dynamic or hybrid) have been applied for detection. Advances in Deep Learning (DL) has attracted a lot of interests in applications of malware detection. In particular, the file binaries are fed in to the DL neural network for training and testing. Despite the theoretical b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(12 citation statements)
references
References 20 publications
(22 reference statements)
0
12
0
Order By: Relevance
“…According to Table 6, our proposed approach outperforms the state-of-the-art approaches, with the best recall (98.67%), F1-score (98.70%), and accuracy (98.68%). Although [35] had the best precision rate, our approach outperformed it in terms of recall, F1-score, and accuracy. These significant improvements are attributed to the usage of TL and ensembling strategies, which aid in producing excellent outcomes, with 0.47% accuracy improvement, 0.55% F1score improvement, and 0.93% recall improvement by reusing and fusing the knowledge collected from previously trained models.…”
Section: Comparison With Similar Workmentioning
confidence: 82%
See 1 more Smart Citation
“…According to Table 6, our proposed approach outperforms the state-of-the-art approaches, with the best recall (98.67%), F1-score (98.70%), and accuracy (98.68%). Although [35] had the best precision rate, our approach outperformed it in terms of recall, F1-score, and accuracy. These significant improvements are attributed to the usage of TL and ensembling strategies, which aid in producing excellent outcomes, with 0.47% accuracy improvement, 0.55% F1score improvement, and 0.93% recall improvement by reusing and fusing the knowledge collected from previously trained models.…”
Section: Comparison With Similar Workmentioning
confidence: 82%
“…Previously presented studies are time-consuming and provide a high level of complexity to assure the detection and classification tasks, and this is due mainly to the rising varieties and volume of IoT malware data [18,35]. Indeed, the translation of raw data into feature vectors for use by new or conventional CNN architectures necessitates a high level of engineering and technological expertise.…”
mentioning
confidence: 99%
“…In [ 13 ], a method for searching for malware using deep learning is proposed. The binary code of the programs is used for both training and testing.…”
Section: Discussionmentioning
confidence: 99%
“…There is a sufficient number of methodological approaches and methods for the analysis of MC [ 9 , 10 , 11 ]. However, the primary task is to determine the architecture of the processor (hereinafter–Architecture), for execution on which this MC is intended [ 12 , 13 , 14 ]. This is necessary to select the appropriate tools designed to analyze only a specific set of machine instructions.…”
Section: Introductionmentioning
confidence: 99%
“…A survey of such models is also discussed in [20], wherein CNNs, RNNs, LSTMs, & Gated Recurrent Units (GRUs) are analyzed for identification of IoT (Internet of Things) based malware signatures. Extensions to these models are discussed in [21,22,23]…”
Section: Literature Reviewmentioning
confidence: 99%