ANALYSIS OF RESNET MODEL FOR MALICIOUS CODE DETECTION

被引:0
|
作者
Khan, Riaz Ullah [1 ]
Zhang, Xiaosong [1 ]
Kumar, Rajesh [1 ]
Tariq, Hussain Ahmad [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Sichuan, Peoples R China
关键词
Malware Detection; Malware Classification; Opcode; ResNet;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this study, we have used the ResNet model to detect the new type of malware. ResNet model is investigated and tested which belongs to Microsoft. We have used two types of datasets to train and test the model. We collected dataset from Microsoft Malware Classification Challenge which contains 10868 Binary files, these binary files are further divided in nine different malware families and second dataset is benign dataset which contained 3000 different kinds of benign software. Benign dataset and dataset from Microsoft Malware Classification Challenge were initially. exe files which were converted in to opcode and then converted in to image files. We obtained a testing accuracy of 87.98% on ResNet model.
引用
收藏
页码:239 / 242
页数:4
相关论文
共 50 条
  • [41] MHC-inspired approach for malicious code detection
    Zhang, Yu
    Li, Tao
    Wu, Li-Hua
    Qin, Ren-Chao
    Zhao, Kui
    [J]. Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2009, 10 (04): : 344 - 349
  • [42] The Algorithm of Malicious Code Detection Based on Data Mining
    Yang, Yubo
    Zhao, Yang
    Liu, Xiabi
    [J]. GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [43] An effective malicious code detection mechanism for virtual desktop
    [J]. Guo, Y. (gy-u@163.com), 1600, Chinese Institute of Electronics (42):
  • [44] A Multiple Pattern Matching Method for Malicious Code Detection
    Huang, Der-Chen
    Lo, Hung-Cheng
    Lai, Ping-Liang
    Chen, Wei-Ming
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (02): : 181 - 193
  • [45] Power Based Malicious Code Detection Techniques for Smartphones
    Dixon, Bryan
    Mishra, Shivakant
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 142 - 149
  • [46] On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code
    Y. V. Kosolapov
    [J]. Automatic Control and Computer Sciences, 2021, 55 : 827 - 837
  • [47] Dynamic Malicious Code Detection Based on Binary Translator
    Fang, Zhe
    Li, Minglu
    Weng, Chuliang
    Luo, Yuan
    [J]. CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 80 - 89
  • [48] Detection of Malicious Code Variants Based on Deep Learning
    Cui, Zhihua
    Xue, Fei
    Cai, Xingjuan
    Cao, Yang
    Wang, Gai-ge
    Chen, Jinjun
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (07) : 3187 - 3196
  • [49] Malicious code detection for Android using Instruction Signatures
    Hu Ge
    Li Ting
    Dong Hang
    Yu Hewei
    Zhang Miao
    [J]. 2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 332 - 337
  • [50] Malicious code detection based on heterogeneous information network
    Liu, Yashu
    Hou, Yueran
    Yan, Hanbing
    [J]. Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 258 - 265