Cited 77 time in
Long short-term memory-based Malware classification method for information security
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Kang, Jungho | - |
| dc.contributor.author | Jang, Sejun | - |
| dc.contributor.author | Li, Shuyu | - |
| dc.contributor.author | Jeong, Young-Sik | - |
| dc.contributor.author | Sung, Yunsick | - |
| dc.date.accessioned | 2023-04-28T03:40:52Z | - |
| dc.date.available | 2023-04-28T03:40:52Z | - |
| dc.date.issued | 2019-07 | - |
| dc.identifier.issn | 0045-7906 | - |
| dc.identifier.issn | 1879-0755 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/7938 | - |
| dc.description.abstract | Signature-based malware detection approaches are inadequate for detecting the increasingly intelligent and large number of malware programs emerging today. Therefore, alternative approaches are required. The effects of malware can be estimated by analyzing the opcodes in its executable files. It can then be classified into families using a long short-term memory (LSTM) network. Vectorizing opcodes and application programming interface (API) function names using one-hot encoding results in high-dimensional vectors because each case is represented using one dimension. Therefore, this paper proposes a word2vec-based LSTM method to analyze opcodes and API function names using fewer dimensions. The results of opcode and API function name classification using the proposed method and one-hot encoding were compared using the Microsoft Malware Classification Challenge dataset. The proposed method showed approximately 0.5% higher performance than the one-hot encoding-based approach. (C) 2019 Elsevier Ltd. All rights reserved. | - |
| dc.format.extent | 10 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | PERGAMON-ELSEVIER SCIENCE LTD | - |
| dc.title | Long short-term memory-based Malware classification method for information security | - |
| dc.type | Article | - |
| dc.publisher.location | 영국 | - |
| dc.identifier.doi | 10.1016/j.compeleceng.2019.06.014 | - |
| dc.identifier.scopusid | 2-s2.0-85068035946 | - |
| dc.identifier.wosid | 000483629600028 | - |
| dc.identifier.bibliographicCitation | COMPUTERS & ELECTRICAL ENGINEERING, v.77, pp 366 - 375 | - |
| dc.citation.title | COMPUTERS & ELECTRICAL ENGINEERING | - |
| dc.citation.volume | 77 | - |
| dc.citation.startPage | 366 | - |
| dc.citation.endPage | 375 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.subject.keywordAuthor | Malware classification | - |
| dc.subject.keywordAuthor | Security | - |
| dc.subject.keywordAuthor | Deep learning | - |
| dc.subject.keywordAuthor | Static analysis | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
