Corpus ID: 236493642

Malware Classification Using Transfer Learning

@article{Farhat2021MalwareCU,
  title={Malware Classification Using Transfer Learning},
  author={H. Farhat and Veronica Rammouz},
  journal={ArXiv},
  year={2021},
  volume={abs/2107.13743}
}
With the rapid growth of the number of devices on the Internet, malware poses a threat not only to the affected devices but also their ability to use said devices to launch attacks on the Internet ecosystem. Rapid malware classification is an important tools to combat that threat. One of the successful approaches to classification is based on malware images and deep learning. While many deep learning architectures are very accurate they usually take a long time to train. In this work we perform… Expand

Figures and Tables from this paper

References

SHOWING 1-10 OF 17 REFERENCES
Malicious Software Classification Using Transfer Learning of ResNet-50 Deep Neural Network
TLDR
A malware family classification approach using a deep neural network based on the ResNet-50 architecture that can effectively be used to classify malware families with an accuracy of 98.62% is presented. Expand
Malware Classification with Deep Convolutional Neural Networks
TLDR
A CNN-based architecture to classify malware samples is proposed that achieves better than the state-of-the-art performance on two challenging malware classification datasets, Malimg and Microsoft malware. Expand
Byte-level malware classification based on markov images and deep learning
TLDR
A byte-level malware classification method based on markov images and deep learning referred to as MDMC is proposed, which shows that MDMC has better performance than GDMC. Expand
Malware detection based on deep learning algorithm
TLDR
Compared with traditional shallow neural networks, DBNs can use unlabeled data to pretrain a multi-layer generative model, which can better represent the characteristics of data samples and effectively model the underlying structure of input data and significantly reduce the dimensions of feature vectors. Expand
Performance analysis of machine learning and pattern recognition algorithms for Malware classification
TLDR
This paper visualize viruses in an image as they capture minor changes while retaining a global structure and implements Principal Component Analysis (PCA) method for feature extraction and studies the performance of various Artificial Neural Network algorithms along with K-Nearest Neighbors and Support Vector Machine classification techniques for identification of malware data into their respective classes. Expand
Malware analysis using visualized images and entropy graphs
TLDR
This paper proposes a new malware family classification method by converting binary files into images and entropy graphs and shows that the proposed method can effectively distinguish malware families. Expand
Microsoft Malware Classification Challenge
TLDR
A high-level comparison of the publications citing the Microsoft Malware Classification Challenge dataset simplifies finding potential research directions in this field and future performance evaluation of the dataset. Expand
Malware images: visualization and automatic classification
TLDR
Preliminary experimental results are quite promising with 98% classification accuracy on a malware database of 9,458 samples with 25 different malware families and the technique exhibits interesting resilience to popular obfuscation techniques such as section encryption. Expand
Entropy analysis to classify unknown packing algorithms for malware detection
TLDR
The study confirms that packing algorithms can be identified through an entropy analysis based on a measure of the uncertainty of the running processes and without prior knowledge of the executables. Expand
Understanding the Mirai Botnet
TLDR
It is argued that Mirai may represent a sea change in the evolutionary development of botnets--the simplicity through which devices were infected and its precipitous growth, and that novice malicious techniques can compromise enough low-end devices to threaten even some of the best-defended targets. Expand
...
1
2
...