A comparative study of deep transfer learning models for malware classification using image datasets

Ranjeet Kumar Ranjan, Amit Singh
{"title":"A comparative study of deep transfer learning models for malware classification using image datasets","authors":"Ranjeet Kumar Ranjan, Amit Singh","doi":"10.1504/ijics.2023.132735","DOIUrl":null,"url":null,"abstract":"This paper proposes deep convolution neural network-based malware classification approach. The proposed work is a transfer learning approach, where we have developed multiple deep learning classification models. The classification models are built by adapting multiple pre-trained convolutional neural networks, namely; Xception, VGG19, InceptionResNetV2, MobileNet, InceptionV3, DenseNet, and ResNet50. In the current work, weights of pre-trained models are embellished by adding three fully connected (FC) layers. The proposed models have been evaluated on two different malware datasets, Microsoft and MalImg, consisting of malware images. The focus of this paper is to analyse the performance of fine-tuned CNN models for malware classification. The results of our experiments show that InceptionResNetV2 and Xception models have performed considerably well for the Microsoft dataset with accuracy equal to 96% and 95%, respectively. In the case of the MalImg dataset, InceptionResNetV2, InceptionV3, and Xception models have achieved excellent performance with an accuracy of up to 96%.","PeriodicalId":53652,"journal":{"name":"International Journal of Information and Computer Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information and Computer Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijics.2023.132735","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 1

Abstract

This paper proposes deep convolution neural network-based malware classification approach. The proposed work is a transfer learning approach, where we have developed multiple deep learning classification models. The classification models are built by adapting multiple pre-trained convolutional neural networks, namely; Xception, VGG19, InceptionResNetV2, MobileNet, InceptionV3, DenseNet, and ResNet50. In the current work, weights of pre-trained models are embellished by adding three fully connected (FC) layers. The proposed models have been evaluated on two different malware datasets, Microsoft and MalImg, consisting of malware images. The focus of this paper is to analyse the performance of fine-tuned CNN models for malware classification. The results of our experiments show that InceptionResNetV2 and Xception models have performed considerably well for the Microsoft dataset with accuracy equal to 96% and 95%, respectively. In the case of the MalImg dataset, InceptionResNetV2, InceptionV3, and Xception models have achieved excellent performance with an accuracy of up to 96%.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于图像数据集的恶意软件分类深度迁移学习模型的比较研究
提出了基于深度卷积神经网络的恶意软件分类方法。提出的工作是一种迁移学习方法,其中我们开发了多个深度学习分类模型。通过自适应多个预训练的卷积神经网络构建分类模型,即;exception、VGG19、InceptionResNetV2、MobileNet、InceptionV3、DenseNet、ResNet50。在目前的工作中,通过添加三个完全连接(FC)层来修饰预训练模型的权重。所提出的模型在两个不同的恶意软件数据集(Microsoft和MalImg)上进行了评估,这些数据集由恶意软件图像组成。本文的重点是分析微调后的CNN模型在恶意软件分类中的性能。我们的实验结果表明,InceptionResNetV2和Xception模型在Microsoft数据集上表现相当好,准确率分别为96%和95%。在MalImg数据集的情况下,InceptionResNetV2、InceptionV3和Xception模型取得了优异的性能,准确率高达96%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Information and Computer Security
International Journal of Information and Computer Security Engineering-Safety, Risk, Reliability and Quality
CiteScore
1.40
自引率
0.00%
发文量
90
期刊介绍: - Assurance and integrity of service. - Computer crime prevention/detection, computer forensics and security. - Confidentiality protection, cryptography and data protection. - Database and data security, denial of service protection. - E-commerce security, e-surveillance. - Fraud/hacker/terrorism detection/prevention, information warfare, national security. - Information ethics. - Information privacy issues, information systems/information security, sharing. - Internet abuse, network intruder prevention, internet/network security. - Malicious code/unauthorised access protection, transaction security, virus/worm controls. - Risk management, safety-critical systems. - Secure communications technology and computer systems. - Security control measures, policy models and mechanisms. - Software and hardware architectures. - Wireless/mobile network security.
期刊最新文献
Data Breach: Analysis, Countermeasures, and Challenges Ensemble Learning Algorithms with Feature Reduction Mechanism for Intrusion Detection System HEMC: A Dynamic Behavior Analysis System for Malware based on Hardware Virtualization Augmenting the detection of Online Image theft using diagonal transformation and iris biometric watermarking A Novel Stream Cipher Based on Quasigroups and QG-PRNG
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1