Abstract

The emergence of malicious codes has increased exponentially due to the spread of malicious code creation tools with the development of the network, but there are limitations in response through the existing malicious code detection methods. In accordance with this situation, machine learning-based malicious code detection methods are developing, and in this paper, features are extracted by statically analyzing PE files for machine learning-based malicious code detection, and then malicious codes are detected through autoencoder. Research on how to extract features that represent better features is underway. This paper extracts 549 features consisting of information such as DLL/API that can be checked from PE files that are commonly used in malicious code analysis and compresses the data by storing data through SAE (Stacked AutoEncoder) among autoencoders. Was extracted to prove that it is very effective in providing excellent accuracy and shortening processing time.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.