Semantic Malware Classification Using Artificial Intelligence Techniques
Autor:
Martin, Eliel
; Bermejo Higuera, Javier
; Sant’Ana, Ricardo
; Bermejo Higuera, Juan Ramón
; Sicilia Montalvo, Juan Antonio
; Piedrahita Castillo, Diego
Fecha:
2025Palabra clave:
Revista / editorial:
Computer Modeling in Engineering & SciencesCitación:
Martins, E., Higuera, J.B., Sant’Ana, R., Higuera, J.R.B., Montalvo, J.A.S. et al. (2025). Semantic Malware Classification Using Artificial Intelligence Techniques. Computer Modeling in Engineering & Sciences, 142(3), 3031–3067. https://doi.org/10.32604/cmes.2025.061080Tipo de Ítem:
articleDirección web:
https://www.techscience.com/CMES/v142n3/59773
Resumen:
The growing threat of malware, particularly in the Portable Executable (PE) format, demands more effective methods for detection and classification. Machine learning-based approaches exhibit their potential but often neglect semantic segmentation of malware files that can improve classification performance. This research applies deep learning to malware detection, using Convolutional Neural Network (CNN) architectures adapted to work with semantically extracted data to classify malware into malware families. Starting from the Malconv model, this study introduces modifications to adapt it to multi-classification tasks and improve its performance. It proposes a new innovative method that focuses on byte extraction from Portable Executable (PE) malware files based on their semantic location, resulting in higher accuracy in malware classification than traditional methods using full-byte sequences. This novel approach evaluates the importance of each semantic segment to improve classification accuracy. The results revealed that the header segment of PE files provides the most valuable information for malware identification, outperforming the other sections, and achieving an average classification accuracy of 99.54%. The above reaffirms the effectiveness of the semantic segmentation approach and highlights the critical role header data plays in improving malware detection and classification accuracy.
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
| Año |
| 2012 |
| 2013 |
| 2014 |
| 2015 |
| 2016 |
| 2017 |
| 2018 |
| 2019 |
| 2020 |
| 2021 |
| 2022 |
| 2023 |
| 2024 |
| 2025 |
| 2026 |
| Vistas |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 36 |
| Descargas |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 11 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
Vaccine Hesitancy on Social Media: Sentiment Analysis from June 2011 to April 2019
Piedrahita-Valdés, Hilary; Piedrahita Castillo, Diego ; Bermejo-Higuera, Javier ; Guillem-Saiz, Patricia; Bermejo Higuera, Juan Ramón ; Guillem-Saiz, Javier; Sicilia, Juan Antonio ; Machío-Regidor, Francisco (Vaccines, 01/2021)Vaccine hesitancy was one of the ten major threats to global health in 2019, according to the World Health Organisation. Nowadays, social media has an important role in the spread of information, misinformation, and ... -
A New Mail System for Secure Data Transmission in Cyber Physical Systems
Piedrahita Castillo, Diego ; Machio, Francisco ; Bermejo-Higuera, Javier ; Bermejo Higuera, Juan Ramón ; Sicilia, Juan Antonio (International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 12/2020)This paper provides a complete study on email requirements, with special emphasis on its security aspects and architecture. It explores how current protocols have evolved, the environment in which they have been developed ... -
Systematic Approach to Malware Analysis (SAMA)
Bermejo-Higuera, Javier; Abad-Aramburu, Carlos; Bermejo Higuera, Juan Ramón; Sicilia Urban, Miguel Ángel; Sicilia, Juan Antonio (Applied Sciences, 02/2020)Malware threats pose new challenges to analytic and reverse engineering tasks. It is needed for a systematic approach to that analysis, in an attempt to fully uncover their underlying attack vectors and techniques and find ...





