Cited 83 time in
Malware Detection Using Deep Transferred Generative Adversarial Networks
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Kim, Jin-Young | - |
| dc.contributor.author | Bu, Seok-Jun | - |
| dc.contributor.author | Cho, Sung-Bae | - |
| dc.date.accessioned | 2024-12-03T02:01:02Z | - |
| dc.date.available | 2024-12-03T02:01:02Z | - |
| dc.date.issued | 2017-10 | - |
| dc.identifier.issn | 0302-9743 | - |
| dc.identifier.issn | 1611-3349 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/73669 | - |
| dc.description.abstract | Malicious software is generated with more and more modified features of which the methods to detect malicious software use characteristics. Automatic classification of malicious software is efficient because it does not need to store all characteristic. In this paper, we propose a transferred generative adversarial network (tGAN) for automatic classification and detection of the zero-day attack. Since the GAN is unstable in training process, often resulting in generator that produces nonsensical outputs, a method to pre-train GAN with autoencoder structure is proposed. We analyze the detector, and the performance of the detector is visualized by observing the clustering pattern of malicious software using t-SNE algorithm. The proposed model gets the best performance compared with the conventional machine learning algorithms. | - |
| dc.format.extent | 9 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Springer Verlag | - |
| dc.title | Malware Detection Using Deep Transferred Generative Adversarial Networks | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1007/978-3-319-70087-8_58 | - |
| dc.identifier.scopusid | 2-s2.0-85035114862 | - |
| dc.identifier.wosid | 000576768000058 | - |
| dc.identifier.bibliographicCitation | Lecture Notes in Computer Science, v.10634, pp 556 - 564 | - |
| dc.citation.title | Lecture Notes in Computer Science | - |
| dc.citation.volume | 10634 | - |
| dc.citation.startPage | 556 | - |
| dc.citation.endPage | 564 | - |
| dc.type.docType | Proceedings Paper | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
| dc.subject.keywordAuthor | Malicious software | - |
| dc.subject.keywordAuthor | Zero-day attack | - |
| dc.subject.keywordAuthor | Generative adversarial network | - |
| dc.subject.keywordAuthor | Autoencoder | - |
| dc.subject.keywordAuthor | Transfer learning | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
