Research Article

Binary File’s Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification

Table 9

Proposed method compared with other malware classification methods on the Big2015 dataset.

MethodsAcc (%)Recall (%) (%)RT (s)

GIST + KNN [3]94.8294.8194.750.621
LBP + KNN [25]91.8791.8891.870.045
GIST + DSIFT + RF [6]95.0995.1095.060.004
VGG16 (fine-tune) [28]97.9297.9397.9262.59
Our method99.5499.5399.537.91

RT means running time.