Covering Arrays ML HPO for Static Malware Detection

نویسندگان

چکیده

Malware classification is a well-known problem in computer security. Hyper-parameter optimisation (HPO) using covering arrays (CAs) novel approach that can enhance machine learning classifier accuracy. The tuning of (ML) classifiers to increase accuracy needed nowadays, especially with newly evolving malware. Four techniques were tuned cAgen, tool for generating arrays. results show cAgen an efficient achieve the optimal parameter choices ML techniques. Moreover, array shows significant promise, regard hyper-parameter community, malware detectors community and overall security testing. This research will aid adding better static PE detection.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Profiles of covering arrays of strength two

Covering arrays of strength two have been widely studied as combinatorial models of software interaction test suites for pairwise testing. While numerous algorithmic techniques have been developed for the generation of covering arrays with few columns (factors), the construction of covering arrays with many factors and few tests by these techniques is problematic. Random generation techniques c...

متن کامل

Mac Malware Detection via Static File Structure Analysis

It is widely acknowledged in the security community that the current signature-based approach to virus detection is no longer adequate. More recently, antivirus software has been doing dynamic malicious behavior detection. While this is more effective, it is computationally expensive, so they cannot do very much of it or the performance of the user’s computer will suffer. Static executable anal...

متن کامل

A Static Malware Detection System Using Data Mining Methods

A serious threat today is malicious executables. It is designed to damage computer system and some of them spread over network without the knowledge of the owner using the system. Two approaches have been derived for it i.e. Signature Based Detection and Heuristic Based Detection. These approaches performed well against known malicious programs but cannot catch the new malicious programs. Diffe...

متن کامل

Zozzle: Low-overhead Mostly Static JavaScript Malware Detection

JavaScript malware-based attacks account for a large fraction of successful mass-scale exploitation happening today. From the standpoint of the attacker, the attraction is that these drive-by attacks can be mounted against an unsuspecting user visiting a seemingly innocent web page. While several techniques for addressing these types of exploits have been proposed, in-browser adoption has been ...

متن کامل

Covering arrays from cyclotomy

For a prime power q ≡ 1 (mod v), the q × q cyclotomic matrix, whose entries are the discrete logarithmsmodulo v of the entries in the addition table of Fq , has been shown using character theoretic arguments to produce an ε-biased array, provided that q is large enough as a function of v and ε. A suitable choice of ε ensures that the array is a covering array of strength t when q > t2v4t . On t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Eng

سال: 2023

ISSN: ['2673-4117']

DOI: https://doi.org/10.3390/eng4010032