Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Indonesian Journal o...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Indonesian Journal of Electrical Engineering and Computer Science
Article . 2022 . Peer-reviewed
License: CC BY NC
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2022
License: CC BY
Data sources: ZENODO
versions View all 2 versions
addClaim

Classification of malware using multinomial linked latent modular double q learning

Authors: Sheelavathy Veerabhadrappa Kudrekar; Udaya Rani Vinayakamurthy;

Classification of malware using multinomial linked latent modular double q learning

Abstract

In recent times, malware has progressed by utilizing distinct advanced machine learning techniques for detection. However, the model becomes complicated and the singular value decomposition and depth-based malware detectors failed to detect the malware significantly with minimum time and overhead. This paper proposes a multinomial linked latent dirichlet and modular double q learning (MLLD-MDQL) to efficiently detect malware based on the network behavior patterns. First, multinomial linked latent dirichlet network behavior extraction (ML-LDNBE) is applied to the input network for anomaly detection that extracts the behavior based on the network pattern. The behavior is extracted which are grouped to perform on the path protocol for analyzing repeated behaviors. Finally, the modular double q learning malware classification model is the grouped behaviors for significant malware detection. The effectiveness of proposed MLLD-M DQL method is compared with existing models. The results obtained by the proposed method show that the model combined with the machine learning (ML) significantly determined malware detection time and also reduced the false positive rate (FPR). The results showed that the false positive rate is significantly reduced by 42% for the proposed method better when compared to the existing behavior based malware detection model that obtained 62% of FPR.

Related Organizations
Keywords

Network behavior, Multinomial, Linked latent dirichlet, Malware attack detection, Double q learning

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    1
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
    OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 3
    download downloads 7
  • 3
    views
    7
    downloads
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
download
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
1
Average
Average
Average
3
7
gold