Mostrar el registro sencillo del ítem
Semantic Malware Classification Using Artificial Intelligence Techniques
| dc.contributor.author | Martin, Eliel | |
| dc.contributor.author | Bermejo Higuera, Javier | |
| dc.contributor.author | Sant’Ana, Ricardo | |
| dc.contributor.author | Bermejo Higuera, Juan Ramón | |
| dc.contributor.author | Sicilia Montalvo, Juan Antonio | |
| dc.contributor.author | Piedrahita Castillo, Diego | |
| dc.date | 2025 | |
| dc.date.accessioned | 2026-04-20T14:53:31Z | |
| dc.date.available | 2026-04-20T14:53:31Z | |
| dc.identifier.citation | Martins, E., Higuera, J.B., Sant’Ana, R., Higuera, J.R.B., Montalvo, J.A.S. et al. (2025). Semantic Malware Classification Using Artificial Intelligence Techniques. Computer Modeling in Engineering & Sciences, 142(3), 3031–3067. https://doi.org/10.32604/cmes.2025.061080 | es_ES |
| dc.identifier.issn | 1526-1492 | |
| dc.identifier.issn | 1526-1506 | |
| dc.identifier.uri | https://reunir.unir.net/handle/123456789/19519 | |
| dc.description.abstract | The growing threat of malware, particularly in the Portable Executable (PE) format, demands more effective methods for detection and classification. Machine learning-based approaches exhibit their potential but often neglect semantic segmentation of malware files that can improve classification performance. This research applies deep learning to malware detection, using Convolutional Neural Network (CNN) architectures adapted to work with semantically extracted data to classify malware into malware families. Starting from the Malconv model, this study introduces modifications to adapt it to multi-classification tasks and improve its performance. It proposes a new innovative method that focuses on byte extraction from Portable Executable (PE) malware files based on their semantic location, resulting in higher accuracy in malware classification than traditional methods using full-byte sequences. This novel approach evaluates the importance of each semantic segment to improve classification accuracy. The results revealed that the header segment of PE files provides the most valuable information for malware identification, outperforming the other sections, and achieving an average classification accuracy of 99.54%. The above reaffirms the effectiveness of the semantic segmentation approach and highlights the critical role header data plays in improving malware detection and classification accuracy. | es_ES |
| dc.language.iso | eng | es_ES |
| dc.publisher | Computer Modeling in Engineering & Sciences | es_ES |
| dc.relation.ispartofseries | ;vol. 142, nº 3 | |
| dc.relation.uri | https://www.techscience.com/CMES/v142n3/59773 | es_ES |
| dc.rights | openAccess | es_ES |
| dc.subject | malware | es_ES |
| dc.subject | portable executable | es_ES |
| dc.subject | semantic | es_ES |
| dc.subject | convolutional neural networks | es_ES |
| dc.title | Semantic Malware Classification Using Artificial Intelligence Techniques | es_ES |
| dc.type | article | es_ES |
| reunir.tag | ~OPU | es_ES |
| dc.identifier.doi | https://doi.org/10.32604/cmes.2025.061080 |





