Research Article
A Novel Malware Classification Method Based on Crucial Behavior
| Type | Method | RF | SVM | DT | KNN |
| C3SG | TF-IDF | 0.9450 | 0.9350 | 0.9448 | 0.9391 | Improved TF-IDF | 0.9507 | 0.9475 | 0.9434 | 0.9420 |
| C4SG | TF-IDF | 0.9498 | 0.9448 | 0.9350 | 0.9391 | Improved TF-IDF | 0.9527 | 0.9493 | 0.9441 | 0.9459 |
| C5SG | TF-IDF | 0.9482 | 0.9489 | 0.9382 | 0.9425 | Improved TF-IDF | 0.9520 | 0.9489 | 0.9425 | 0.9441 |
| C6SG | TF-IDF | 0.9470 | 0.9470 | 0.9375 | 0.9425 | Improved TF-IDF | 0.9505 | 0.9468 | 0.9407 | 0.9439 |
|
|