{"title":"使用卷积神经网络分析恶意软件数据集","authors":"Subhojeet Pramanik, Hemanth Teja","doi":"10.1109/ICISC44355.2019.9036424","DOIUrl":null,"url":null,"abstract":"The aim of this research is to implement Neural Network algorithms to achieve a model of precision (f1-score and recall) for investigating malevolent Windows portable execution files. The paper utilizes EMBER - a benchmark dataset that contains features extracted from 1.1M binary files. The dataset contains 900K training samples (malicious, benign and unlabeled samples) and 200K test samples and provides numerous cases to build models that enhance information security. So, in order to determine if a given file is a malware or not we implemented algorithms like Convolutional Neural Networks and Feed Forward Neural Networks and assembled the results in terms of accuracy.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"2021 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"EMBER - Analysis of Malware Dataset Using Convolutional Neural Networks\",\"authors\":\"Subhojeet Pramanik, Hemanth Teja\",\"doi\":\"10.1109/ICISC44355.2019.9036424\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The aim of this research is to implement Neural Network algorithms to achieve a model of precision (f1-score and recall) for investigating malevolent Windows portable execution files. The paper utilizes EMBER - a benchmark dataset that contains features extracted from 1.1M binary files. The dataset contains 900K training samples (malicious, benign and unlabeled samples) and 200K test samples and provides numerous cases to build models that enhance information security. So, in order to determine if a given file is a malware or not we implemented algorithms like Convolutional Neural Networks and Feed Forward Neural Networks and assembled the results in terms of accuracy.\",\"PeriodicalId\":419157,\"journal\":{\"name\":\"2019 Third International Conference on Inventive Systems and Control (ICISC)\",\"volume\":\"2021 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Third International Conference on Inventive Systems and Control (ICISC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISC44355.2019.9036424\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Third International Conference on Inventive Systems and Control (ICISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISC44355.2019.9036424","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
EMBER - Analysis of Malware Dataset Using Convolutional Neural Networks
The aim of this research is to implement Neural Network algorithms to achieve a model of precision (f1-score and recall) for investigating malevolent Windows portable execution files. The paper utilizes EMBER - a benchmark dataset that contains features extracted from 1.1M binary files. The dataset contains 900K training samples (malicious, benign and unlabeled samples) and 200K test samples and provides numerous cases to build models that enhance information security. So, in order to determine if a given file is a malware or not we implemented algorithms like Convolutional Neural Networks and Feed Forward Neural Networks and assembled the results in terms of accuracy.