View : 154 Download: 0

Evaluation of Malware Classification Models for Heterogeneous Data

Title
Evaluation of Malware Classification Models for Heterogeneous Data
Authors
BaeHo
Ewha Authors
배호
SCOPUS Author ID
배호scopus
Issue Date
2024
Journal Title
Sensors
ISSN
1424-8220JCR Link
Citation
Sensors vol. 24, no. 1
Keywords
adversarial learningdeep learninginterpretabilityIoTXAI for CTI applicationsXAI for cybersecurity data
Publisher
Multidisciplinary Digital Publishing Institute (MDPI)
Indexed
SCIE; SCOPUS WOS scopus
Document Type
Article
Abstract
Machine learning (ML) has found widespread application in various domains. Additionally, ML-based techniques have been employed to address security issues in technology, with numerous studies showcasing their potential and effectiveness in tackling security problems. Over the years, ML methods for identifying malicious software have been developed across various security domains. However, recent research has highlighted the susceptibility of ML models to small input perturbations, known as adversarial examples, which can significantly alter model predictions. While prior studies on adversarial examples primarily focused on ML models for image processing, they have progressively extended to other applications, including security. Interestingly, adversarial attacks have proven to be particularly effective in the realm of malware classification. This study aims to explore the transparency of malware classification and develop an explanation method for malware classifiers. The challenge at hand is more complex than those associated with explainable AI for homogeneous data due to the intricate data structure of malware compared to traditional image datasets. The research revealed that existing explanations fall short in interpreting heterogeneous data. Our employed methods demonstrated that current malware detectors, despite high classification accuracy, may provide a misleading sense of security and measuring classification accuracy is insufficient for validating detectors. © 2024 by the author.
DOI
10.3390/s24010288
Appears in Collections:
인공지능대학 > 사이버보안학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE