Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Analyzing the performance of long short-term memory architectures for malware detection models
Download
Concurrency and Computation - 2023 - Avci - Analyzing the performance of long short‐term memory architectures for malware.pdf
Date
2023-03-10
Author
Avcı, Çiğdem
Tekinerdogan, Bedir
Çatal, Çağatay
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
93
views
155
downloads
Cite This
Malicious software forms a threat to many software-intensive systems and as such several malware detection approaches have been introduced, often based on sequential data analysis. Long short-term memory (LSTM) is an artificial recurrent neural network (RNN) architecture that is effective for sequential data analysis, however, no study has yet analyzed the performance of different LSTM architectures for the application of malware detection. In this article, we aim to evaluate and benchmark the performance of LSTM-based malware detection approaches on specific LSTM architectures to provide insight into malware detection. Our method builds LSTM-based malware prediction models and performs experiments using different LSTM architectures including Vanilla LSTM, stacked LSTM, bi-directional LSTM, and CNN-LSTM. We evaluated the performance of each of these architectures and different configurations. Our study, as a contribution, shows that Bidirectional LSTM with hyperparameter optimization is found to be overperforming other selected LSTM architectures. This study shows that different LSTM approaches and architectures are applicable to the malware detection problem. Quality attributes such as efficiency and accuracy, and the software system architecture adopted for the implementation impact the selection of the LSTM approach.
Subject Keywords
deep learning
,
LSTM
,
machine learning
,
malware detection
,
prediction
URI
https://hdl.handle.net/11511/109993
Journal
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
DOI
https://doi.org/10.1002/cpe.7581
Collections
Department of Computer Engineering, Article
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
Ç. Avcı, B. Tekinerdogan, and Ç. Çatal, “Analyzing the performance of long short-term memory architectures for malware detection models,”
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
, vol. 35, no. 6, pp. 1–0, 2023, Accessed: 00, 2024. [Online]. Available: https://hdl.handle.net/11511/109993.