Shobhan Banerjee, B. B. Dash, M. Rath, Tanmaya Swain, Tapaswini Samant
{"title":"恶意软件分类使用双图BOW,像素强度特征,和多处理","authors":"Shobhan Banerjee, B. B. Dash, M. Rath, Tanmaya Swain, Tapaswini Samant","doi":"10.1109/CONECCT55679.2022.9865764","DOIUrl":null,"url":null,"abstract":"The malware classification task launched by Microsoft has been quite popular for the last half a decade. After detecting malware, classification plays an important role, because based on the type of malware, the corresponding action needs to be taken. Feature extraction plays a vital role to proceed ahead with the modeling. The data is in form of two separate files for each malware in consideration, from which we generate the features, choose the top important ones, and train a classical ensemble learning model. There have been various solutions proposed for this task earlier, over which we have made some modifications to achieve better accuracy. We have used the features generated using the bigram Bag of Words (BOW) and included pixel intensity features to approach this task. Since the dataset is quite huge, in this paper we proposed an approach based on multithreading, where instead of processing the data serially, we processed it parallelly through all the cores available in the CPU and optimize the computation time as much as possible.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Malware Classification using Bigram BOW, Pixel Intensity Features, and Multiprocessing\",\"authors\":\"Shobhan Banerjee, B. B. Dash, M. Rath, Tanmaya Swain, Tapaswini Samant\",\"doi\":\"10.1109/CONECCT55679.2022.9865764\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The malware classification task launched by Microsoft has been quite popular for the last half a decade. After detecting malware, classification plays an important role, because based on the type of malware, the corresponding action needs to be taken. Feature extraction plays a vital role to proceed ahead with the modeling. The data is in form of two separate files for each malware in consideration, from which we generate the features, choose the top important ones, and train a classical ensemble learning model. There have been various solutions proposed for this task earlier, over which we have made some modifications to achieve better accuracy. We have used the features generated using the bigram Bag of Words (BOW) and included pixel intensity features to approach this task. Since the dataset is quite huge, in this paper we proposed an approach based on multithreading, where instead of processing the data serially, we processed it parallelly through all the cores available in the CPU and optimize the computation time as much as possible.\",\"PeriodicalId\":380005,\"journal\":{\"name\":\"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONECCT55679.2022.9865764\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONECCT55679.2022.9865764","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
摘要
微软推出的恶意软件分类任务在过去五年中非常受欢迎。在检测出恶意软件后,分类起着重要的作用,因为根据恶意软件的类型,需要采取相应的措施。特征提取在建模过程中起着至关重要的作用。每个恶意软件的数据以两个独立文件的形式存在,我们从中生成特征,选择最重要的特征,并训练经典的集成学习模型。在此之前,针对此任务已经提出了各种解决方案,我们对其进行了一些修改以获得更好的准确性。我们使用了使用双ram Bag of Words (BOW)生成的特征,并包含了像素强度特征来完成这个任务。由于数据集非常庞大,在本文中我们提出了一种基于多线程的方法,即通过CPU中所有可用的内核并行处理数据,而不是串行处理数据,并尽可能优化计算时间。
Malware Classification using Bigram BOW, Pixel Intensity Features, and Multiprocessing
The malware classification task launched by Microsoft has been quite popular for the last half a decade. After detecting malware, classification plays an important role, because based on the type of malware, the corresponding action needs to be taken. Feature extraction plays a vital role to proceed ahead with the modeling. The data is in form of two separate files for each malware in consideration, from which we generate the features, choose the top important ones, and train a classical ensemble learning model. There have been various solutions proposed for this task earlier, over which we have made some modifications to achieve better accuracy. We have used the features generated using the bigram Bag of Words (BOW) and included pixel intensity features to approach this task. Since the dataset is quite huge, in this paper we proposed an approach based on multithreading, where instead of processing the data serially, we processed it parallelly through all the cores available in the CPU and optimize the computation time as much as possible.