Covering Arrays ML HPO for Static Malware Detection
نویسندگان
چکیده
Malware classification is a well-known problem in computer security. Hyper-parameter optimisation (HPO) using covering arrays (CAs) novel approach that can enhance machine learning classifier accuracy. The tuning of (ML) classifiers to increase accuracy needed nowadays, especially with newly evolving malware. Four techniques were tuned cAgen, tool for generating arrays. results show cAgen an efficient achieve the optimal parameter choices ML techniques. Moreover, array shows significant promise, regard hyper-parameter community, malware detectors community and overall security testing. This research will aid adding better static PE detection.
منابع مشابه
Profiles of covering arrays of strength two
Covering arrays of strength two have been widely studied as combinatorial models of software interaction test suites for pairwise testing. While numerous algorithmic techniques have been developed for the generation of covering arrays with few columns (factors), the construction of covering arrays with many factors and few tests by these techniques is problematic. Random generation techniques c...
متن کاملMac Malware Detection via Static File Structure Analysis
It is widely acknowledged in the security community that the current signature-based approach to virus detection is no longer adequate. More recently, antivirus software has been doing dynamic malicious behavior detection. While this is more effective, it is computationally expensive, so they cannot do very much of it or the performance of the user’s computer will suffer. Static executable anal...
متن کاملA Static Malware Detection System Using Data Mining Methods
A serious threat today is malicious executables. It is designed to damage computer system and some of them spread over network without the knowledge of the owner using the system. Two approaches have been derived for it i.e. Signature Based Detection and Heuristic Based Detection. These approaches performed well against known malicious programs but cannot catch the new malicious programs. Diffe...
متن کاملZozzle: Low-overhead Mostly Static JavaScript Malware Detection
JavaScript malware-based attacks account for a large fraction of successful mass-scale exploitation happening today. From the standpoint of the attacker, the attraction is that these drive-by attacks can be mounted against an unsuspecting user visiting a seemingly innocent web page. While several techniques for addressing these types of exploits have been proposed, in-browser adoption has been ...
متن کاملCovering arrays from cyclotomy
For a prime power q ≡ 1 (mod v), the q × q cyclotomic matrix, whose entries are the discrete logarithmsmodulo v of the entries in the addition table of Fq , has been shown using character theoretic arguments to produce an ε-biased array, provided that q is large enough as a function of v and ε. A suitable choice of ε ensures that the array is a covering array of strength t when q > t2v4t . On t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Eng
سال: 2023
ISSN: ['2673-4117']
DOI: https://doi.org/10.3390/eng4010032