Research Article
Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph
Table 5
Malware classification and detection models using various learning algorithms.
| Category | Classifier | Previous works |
| Probabilistic-based algorithm | Naïve Bayes | [14, 19, 33–35] |
| Rule-based algorithm | RIPPER | [33, 35] |
| Function-based algorithm | SVM | [6, 7, 14, 34, 36–38] | MLP | [33, 38] | RBF | [39, 40] |
| Instance-based algorithm | -NN | [14, 33, 34, 36, 38] |
| Tree-based algorithm | Decision tree | [6, 14, 16, 34, 36, 38] |
| Ensemble algorithm | Random forest | [38, 41] | Boosting | [14, 16] | Voting | [42] | Bagging | [41, 43] |
|
|