3260 papers • 126 benchmarks • 313 datasets
Malware Detection is a significant part of endpoint security including workstations, servers, cloud instances, and mobile devices. Malware Detection is used to detect and identify malicious activities caused by malware. With the increase in the variety of malware activities on CMS based websites such as malicious malware redirects on WordPress site (Aka, WordPress Malware Redirect Hack) where the site redirects to spam, being the most widespread, the need for automatic detection and classifier amplifies as well. The signature-based Malware Detection system is commonly used for existing malware that has a signature but it is not suitable for unknown malware or zero-day malware Source: The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey
(Image credit: Papersgraph)
These leaderboards are used to track progress in malware-detection-7
Use these libraries to find malware-detection-7 models and implementations
No subtasks available.
The superiority of MalGAN over traditional gradient based adversarial example generation algorithms is that MalGAN is able to decrease the detection rate to nearly zero and make the retraining based defensive method against adversarial examples hard to work.
This work introduces malware detection from raw byte sequences as a fruitful research area to the larger machine learning community and presents the initial work in building a solution to tackle this problem, which has linear complexity dependence on the sequence length, and allows for interpretable sub-regions of the binary to be identified.
The DkNN algorithm is evaluated on several datasets, and it is shown the confidence estimates accurately identify inputs outside the model, and that the explanations provided by nearest neighbors are intuitive and useful in understanding model failures.
DeepXplore efficiently finds thousands of incorrect corner case behaviors in state-of-the-art DL models with thousands of neurons trained on five popular datasets including ImageNet and Udacity self-driving challenge data.
It is demonstrated that subgraph vectors learnt by the approach could be used in conjunction with classifiers such as CNNs, SVMs and relational data clustering algorithms to achieve significantly superior accuracies on both supervised and unsupervised learning tasks.
A machine learning based solution to classify a sample as benign or malware with high accuracy and low computation overhead is proposed and empirical evidence indicates 98.4% classification accuracy in the 10-fold cross validation for the proposed integrated feature set.
This work explores the feasibility of applying neural networks to malware detection and feature learning by restricting ourselves to a minimal amount of domain knowledge in order to extract a portion of the Portable Executable (PE) header.
The results presented in this paper show that signatures generated by the DBN allow for an accurate classification of new malware variants, and the presented method achieves 98.6% classification accuracy using the signatures Generating malware signatures.
This paper presents a new efficient approach for rigorously checking different safety properties of neural networks that significantly outperforms existing approaches by multiple orders of magnitude and believes that this approach to estimating tight output bounds of a network for a given input range can also help improve the explainability of Neural networks and guide the training process of more robust neural networks.
Adding a benchmark result helps the community track progress.