On the Evaluation of Restricted Boltzmann Machines for Malware Identification
نویسندگان
چکیده
In the last years, tablets and smartphones have been widely used with the very same purpose as desktop computers: web browsing, social networking, banking and others, just to name a few. However, we are often facing the problem of keeping our information protected and trustworthy. As a result of their popularity and functionality, mobile devices are a growing target for malicious activities. In such context, mobile malwares have gained significant ground since the emergence and growth of smartphones and handheld devices, thus becoming a real threat. The main contribution of this paper is to evaluate Restricted Boltzmann Machines (RBMs) for unsupervised feature learning in the context of malware identification. In order to evaluate the results, we employed two supervised pattern recognition techniques, say that Optimum-Path Forest and Support Vector Machines, as well as a classification approach based on RBMs. Keywords—Optimum-Path Forest, Restricted Boltzmann Machines, Malware Detection.
منابع مشابه
A Hybrid Algorithm based on Deep Learning and Restricted Boltzmann Machine for Car Semantic Segmentation from Unmanned Aerial Vehicles (UAVs)-based Thermal Infrared Images
Nowadays, ground vehicle monitoring (GVM) is one of the areas of application in the intelligent traffic control system using image processing methods. In this context, the use of unmanned aerial vehicles based on thermal infrared (UAV-TIR) images is one of the optimal options for GVM due to the suitable spatial resolution, cost-effective and low volume of images. The methods that have been prop...
متن کاملMaterial for : Factored Conditional Restricted Boltzmann Machines for Modeling Motion Style ∗ Graham
In this document, we provide additional details for variants of Conditional Restricted Boltzmann Machines (CRBMs). Specifically we focus on each of the four models compared in the Quantitative Evaluation (Sec. 4.4). We collect the formulae required for contrastive divergence learning of parameters, synthesis from a trained model by alternating Gibbs samping, and forward prediction from a traine...
متن کاملA Hybrid Malicious Code Detection Method based on Deep Learning
In this paper, we propose a hybrid malicious code detection scheme based on AutoEncoder and DBN (Deep Belief Networks). Firstly, we use the AutoEncoder deep learning method to reduce the dimensionality of data. This could convert complicated high-dimensional data into low dimensional codes with the nonlinear mapping, thereby reducing the dimensionality of data, extracting the main features of t...
متن کاملA non-IID Framework for Collaborative Filtering with Restricted Boltzmann Machines
We propose a framework for collaborative filtering based on Restricted Boltzmann Machines (RBM), which extends previous RBMbased approaches in several important directions. First, while previous RBM research has focused on modeling the correlation between item ratings, we model both user-user and item-item correlations in a unified hybrid non-IID framework. We further use real values in the vis...
متن کاملCombining Restricted Boltzmann Machine and One Side Perceptron for Malware Detection
Due to the large increase of malware samples in the last 10 years, the demand of the antimalware industry for an automated classifier has increased. However, this classifier has to satisfy two restrictions in order to be used in real life situations: high detection rate and very low number of false positives. By modifying the perceptron algorithm and combining existing features, we were able to...
متن کامل