Malware Classification using Long Short-term Memory Models

1Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Signature and anomaly based techniques are the quintessential approaches to malware detection. However, these techniques have become increasingly ineffective as malware has become more sophisticated and complex. Researchers have therefore turned to deep learning to construct better performing model. In this paper, we create four different long-short term memory (LSTM) based models and train each to classify malware samples from 20 families. Our features consist of opcodes extracted from malware executables. We employ techniques used in natural language processing (NLP), including word embedding and bidirection LSTMs (biLSTM), and we also use convolutional neural networks (CNN). We find that a model consisting of word embedding, biLSTMs, and CNN layers performs best in our malware classification experiments.

Cite

CITATION STYLE

APA

Dang, D., Di Troia, F., & Stamp, M. (2021). Malware Classification using Long Short-term Memory Models. In International Conference on Information Systems Security and Privacy (pp. 743–752). Science and Technology Publications, Lda. https://doi.org/10.5220/0010378007430752

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free