Research Article

Binary File’s Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification

Table 8

Proposed method compared with other malware classification methods on the malimg dataset.

MethodsAcc (%)Recall (%)(%)RT (s)

GIST + KNN [3]97.2897.2896.610.423
LBP + KNN [25]97.8797.8897.860.052
GIST + DSIFT + RF [6]98.5398.5398.490.026
VGG (fine-tune) [28]98.8498.8498.8259.50
Our method99.7399.7399.737.625

RT means running time.