Analysis of N-Way K-Shot Malware Detection Using Few-Shot Learning

Kwok Tai Chui, Brij B. Gupta, Lap Kei Lee, Miguel Torres-Ruiz

Producción científica: Capítulo del libro/informe/acta de congresoContribución a la conferenciarevisión exhaustiva

Resumen

Solving machine learning problems with small-scale training datasets becomes an emergent research area to fill the opposite end of big data applications. Attention is drawn to malware detection using few-shot learning, which is typically formulated as N-way K-shot problems. The aims are to reduce the effort in data collection, learn the rare cases, reduce the model complexity, and increase the accuracy of the detection model. The performance of the malware detection model is analyzed with the variation in the number of ways and the number of shots. This facilitates the understanding on the design and formulation of three algorithms namely relation network, prototypical network, and relation network for N-way K-shot problems. Two benchmark datasets are selected for the performance evaluation. Results reveal the general characteristics of the performance of malware detection model with fixed ways and varying shots, and varying ways and fixed shots based on the trends of results of 30 scenarios.

Idioma originalInglés
Título de la publicación alojadaInternational Conference on Cyber Security, Privacy and Networking, ICSPN 2022
EditoresNadia Nedjah, Gregorio Martínez Pérez, B.B. Gupta
EditorialSpringer Science and Business Media Deutschland GmbH
Páginas33-44
Número de páginas12
ISBN (versión impresa)9783031220173
DOI
EstadoPublicada - 2023
EventoInternational Conference on Cyber Security, Privacy and Networking, ICSPN 2022 - Virtual, Online
Duración: 9 sep. 202111 sep. 2021

Serie de la publicación

NombreLecture Notes in Networks and Systems
Volumen599 LNNS
ISSN (versión impresa)2367-3370
ISSN (versión digital)2367-3389

Conferencia

ConferenciaInternational Conference on Cyber Security, Privacy and Networking, ICSPN 2022
CiudadVirtual, Online
Período9/09/2111/09/21

Huella

Profundice en los temas de investigación de 'Analysis of N-Way K-Shot Malware Detection Using Few-Shot Learning'. En conjunto forman una huella única.

Citar esto