Detailed Information

Cited 46 time in webofscience Cited 77 time in scopus
Metadata Downloads

Long short-term memory-based Malware classification method for information security

Full metadata record
DC Field Value Language
dc.contributor.authorKang, Jungho-
dc.contributor.authorJang, Sejun-
dc.contributor.authorLi, Shuyu-
dc.contributor.authorJeong, Young-Sik-
dc.contributor.authorSung, Yunsick-
dc.date.accessioned2023-04-28T03:40:52Z-
dc.date.available2023-04-28T03:40:52Z-
dc.date.issued2019-07-
dc.identifier.issn0045-7906-
dc.identifier.issn1879-0755-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/7938-
dc.description.abstractSignature-based malware detection approaches are inadequate for detecting the increasingly intelligent and large number of malware programs emerging today. Therefore, alternative approaches are required. The effects of malware can be estimated by analyzing the opcodes in its executable files. It can then be classified into families using a long short-term memory (LSTM) network. Vectorizing opcodes and application programming interface (API) function names using one-hot encoding results in high-dimensional vectors because each case is represented using one dimension. Therefore, this paper proposes a word2vec-based LSTM method to analyze opcodes and API function names using fewer dimensions. The results of opcode and API function name classification using the proposed method and one-hot encoding were compared using the Microsoft Malware Classification Challenge dataset. The proposed method showed approximately 0.5% higher performance than the one-hot encoding-based approach. (C) 2019 Elsevier Ltd. All rights reserved.-
dc.format.extent10-
dc.language영어-
dc.language.isoENG-
dc.publisherPERGAMON-ELSEVIER SCIENCE LTD-
dc.titleLong short-term memory-based Malware classification method for information security-
dc.typeArticle-
dc.publisher.location영국-
dc.identifier.doi10.1016/j.compeleceng.2019.06.014-
dc.identifier.scopusid2-s2.0-85068035946-
dc.identifier.wosid000483629600028-
dc.identifier.bibliographicCitationCOMPUTERS & ELECTRICAL ENGINEERING, v.77, pp 366 - 375-
dc.citation.titleCOMPUTERS & ELECTRICAL ENGINEERING-
dc.citation.volume77-
dc.citation.startPage366-
dc.citation.endPage375-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Interdisciplinary Applications-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordAuthorMalware classification-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorDeep learning-
dc.subject.keywordAuthorStatic analysis-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Advanced Convergence Engineering > Department of Computer Science and Artificial Intelligence > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Young Sik photo

Jeong, Young Sik
College of Advanced Convergence Engineering (Department of Computer Science and Artificial Intelligence)
Read more

Altmetrics

Total Views & Downloads

BROWSE