Long short-term memory-based Malware classification method for information security
- Authors
- Kang, Jungho; Jang, Sejun; Li, Shuyu; Jeong, Young-Sik; Sung, Yunsick
- Issue Date
- Jul-2019
- Publisher
- PERGAMON-ELSEVIER SCIENCE LTD
- Keywords
- Malware classification; Security; Deep learning; Static analysis
- Citation
- COMPUTERS & ELECTRICAL ENGINEERING, v.77, pp 366 - 375
- Pages
- 10
- Indexed
- SCIE
SCOPUS
- Journal Title
- COMPUTERS & ELECTRICAL ENGINEERING
- Volume
- 77
- Start Page
- 366
- End Page
- 375
- URI
- https://scholarworks.dongguk.edu/handle/sw.dongguk/7938
- DOI
- 10.1016/j.compeleceng.2019.06.014
- ISSN
- 0045-7906
1879-0755
- Abstract
- Signature-based malware detection approaches are inadequate for detecting the increasingly intelligent and large number of malware programs emerging today. Therefore, alternative approaches are required. The effects of malware can be estimated by analyzing the opcodes in its executable files. It can then be classified into families using a long short-term memory (LSTM) network. Vectorizing opcodes and application programming interface (API) function names using one-hot encoding results in high-dimensional vectors because each case is represented using one dimension. Therefore, this paper proposes a word2vec-based LSTM method to analyze opcodes and API function names using fewer dimensions. The results of opcode and API function name classification using the proposed method and one-hot encoding were compared using the Microsoft Malware Classification Challenge dataset. The proposed method showed approximately 0.5% higher performance than the one-hot encoding-based approach. (C) 2019 Elsevier Ltd. All rights reserved.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Advanced Convergence Engineering > Department of Computer Science and Artificial Intelligence > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.