Javascript must be enabled to continue!
Malware Family Classification Based on Vision Transformer
View through CrossRef
<p>Cybersecurity worries intensify as Big Data, the Internet of Things, and 5G technologies develop. Based on code reuse technologies, malware creators are producing new malware quickly, and new malware is continually endangering the effectiveness of existing detection methods. We propose a vision transformer-based approach for malware picture identification because, in contrast to CNN, Transformer’s self-attentive process is not constrained by local interactions and can simultaneously compute long-range mine relationships. We use ViT-B/16 weights pre-trained on the ImageNet21k dataset to improve model generalization capability and fine-tune them for the malware image classification task. This work demonstrates that (i) a pure attention mechanism applies to malware recognition, and (ii) the Transformer can be used instead of traditional CNN for malware image recognition. We train and assess our models using the MalImg dataset and the BIG2015 dataset in this paper. Our experimental evaluation found that the recognition accuracy of transfer learning-based ViT for MalImg samples and BIG2015 samples is 99.14% and 98.22%, respectively. This study shows that training ViT models using transfer learning can perform better than CNN in malware family classification.</p>
<p> </p>
Title: Malware Family Classification Based on Vision Transformer
Description:
<p>Cybersecurity worries intensify as Big Data, the Internet of Things, and 5G technologies develop.
Based on code reuse technologies, malware creators are producing new malware quickly, and new malware is continually endangering the effectiveness of existing detection methods.
We propose a vision transformer-based approach for malware picture identification because, in contrast to CNN, Transformer’s self-attentive process is not constrained by local interactions and can simultaneously compute long-range mine relationships.
We use ViT-B/16 weights pre-trained on the ImageNet21k dataset to improve model generalization capability and fine-tune them for the malware image classification task.
This work demonstrates that (i) a pure attention mechanism applies to malware recognition, and (ii) the Transformer can be used instead of traditional CNN for malware image recognition.
We train and assess our models using the MalImg dataset and the BIG2015 dataset in this paper.
Our experimental evaluation found that the recognition accuracy of transfer learning-based ViT for MalImg samples and BIG2015 samples is 99.
14% and 98.
22%, respectively.
This study shows that training ViT models using transfer learning can perform better than CNN in malware family classification.
</p>
<p> </p>.
Related Results
Hubungan Perilaku Pola Makan dengan Kejadian Anak Obesitas
Hubungan Perilaku Pola Makan dengan Kejadian Anak Obesitas
<p><em><span style="font-size: 11.0pt; font-family: 'Times New Roman',serif; mso-fareast-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-langua...
On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
<span style="font-size:11pt"><span style="background:#f9f9f4"><span style="line-height:normal"><span style="font-family:Calibri,sans-serif"><b><spa...
Automatic Load Sharing of Transformer
Automatic Load Sharing of Transformer
Transformer plays a major role in the power system. It works 24 hours a day and provides power to the load. The transformer is excessive full, its windings are overheated which lea...
An optimal deep learning-based framework for the detection and classification of android malware
An optimal deep learning-based framework for the detection and classification of android malware
The use of smartphones is increasing rapidly and the malicious intrusions associated with it have become a challenging task that needs to be resolved. A secure and effective techn...
AndroDex: Android Dex Images of Obfuscated Malware
AndroDex: Android Dex Images of Obfuscated Malware
AbstractWith the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to...
A Novel Deep Learning Framework for IoT Malware Classification Integrating Feature Fusion and Attention Mechanisms
A Novel Deep Learning Framework for IoT Malware Classification Integrating Feature Fusion and Attention Mechanisms
The detection of malware attacks remains a significant challenge due rapid increase in variety of malicious files. An efficient system is crucial to ensure robust malware protectio...
HYBRID DEEP LEARNING EFFECTIVENESS OF IMAGE-BASED MALWARE DETECTION
HYBRID DEEP LEARNING EFFECTIVENESS OF IMAGE-BASED MALWARE DETECTION
The current high rate of malware variant production each day produces hundreds of thousands of new variants making signature detection methods ineffective. Deep learning patterns s...
Deep Learning-Based Malware Detection and Classification
Deep Learning-Based Malware Detection and Classification
Malware analysis is an important aspect of cyber security and is a key component in securing systems from attackers. New malware signatures are being created continuously and detec...

