Malware classification using deep learning

2Citations
Citations of this article
38Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We’ll display two different kinds of experiments, which are NIDS-based and Dynamic-based analysis shows how artificial intelligence (AI) helps us detecting and classify malware. On the NIDS-based intrusion detection, we use CICIDS2017 as a research dataset, embedding high dimensional features and find out redundant features in the raw dataset by Random Forest algorithm, reach 99.93% accuracy and 0.3% of the false alert rate. We extract the function calls in malware data by the method proposed in this paper to generate text data. The algorithm n-gram and TF-IDF are used to process text data, converts them into numeric features, and by another feature selection methods, we reduce the training time, achieve 87.08% accuracy, and save 87.97% training time in Dynamic-based analysis.

Author supplied keywords

Cite

CITATION STYLE

APA

Lo, C. H., Liu, T. C., Liu, I. H., Li, J. S., Liu, C. G., & Li, C. F. (2020). Malware classification using deep learning. In Proceedings of International Conference on Artificial Life and Robotics (Vol. 2020, pp. 126–129). ALife Robotics Corporation Ltd. https://doi.org/10.5954/ICAROB.2020.OS4-4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free