DeepMalNet: Evaluating shallow and deep networks for static PE malware detection
Clicks: 296
ID: 39501
2018
Article Quality & Performance Metrics
Overall Quality
Improving Quality
0.0
/100
Combines engagement data with AI-assessed academic quality
Reader Engagement
Star Article
64.7
/100
295 views
240 readers
Trending
AI Quality Assessment
Not analyzed
Abstract
This paper primarily evaluates the efficacy of shallow and deep networks to statically detect malicious windows portable executable (PE) files. This uses recently released, labeled and benchmark data set, EMBER malware benchmark data set. As deep networks are parameterized, the parameters are chosen based on comparing the performance of various network parameters and network topologies over various trials of experiments. The experiments of such chosen efficient configurations of deep models are run up to 1000 epochs with varying learning rates between 0.01 and 0.5. The observed results of deep networks are high compared to the shallow networks. Keywords: Static analysis, Malicious and benign binaries and deep networks
| Reference Key |
r2018deepmalnetict
Use this key to autocite in the manuscript while using
SciMatic Manuscript Manager or Thesis Manager
|
|---|---|
| Authors | R., Vinayakumar;K.P., Soman; |
| Journal | ict express |
| Year | 2018 |
| DOI |
DOI not found
|
| URL | |
| Keywords | Keywords not found |
Citations
No citations found. To add a citation, contact the admin at info@scimatic.org
Comments
No comments yet. Be the first to comment on this article.