File-level malware detection using byte streams
As more documents appear on the Internet, it becomes important to detect malware within the documents. Malware of non-executables might be more dangerous because people usually open them without worrying about inherent danger. Recently, deep learning models are used to analyze byte streams of the non-executables for malware detection. Although they have shown successful results, they are commonly designed for stream-level detection, but not for file-level detection. In this paper, we propose a new method that aggregates the stream-level results to get file-level results for malware detection. We demonstrate its effectiveness by experimental results with our annotated dataset, and show that it gives performance gain of 3.37–5.89% of F1 scores.
Топ-30
Журналы
|
1
2
|
|
|
Applied Sciences (Switzerland)
2 публикации, 40%
|
|
|
Computers and Security
1 публикация, 20%
|
|
|
Journal of Computer Virology and Hacking Techniques
1 публикация, 20%
|
|
|
PLoS ONE
1 публикация, 20%
|
|
|
1
2
|
Издатели
|
1
2
|
|
|
MDPI
2 публикации, 40%
|
|
|
Elsevier
1 публикация, 20%
|
|
|
Springer Nature
1 публикация, 20%
|
|
|
Public Library of Science (PLoS)
1 публикация, 20%
|
|
|
1
2
|
- Мы не учитываем публикации, у которых нет DOI.
- Статистика публикаций обновляется еженедельно.