Skip to content

Latest commit

 

History

History
8 lines (7 loc) · 485 Bytes

File metadata and controls

8 lines (7 loc) · 485 Bytes

DynamicMalwareAnalysisUsingDeepNeuralNetworks

  1. Run a Malware in any emulator.
  2. Extract the log file from the same.
  3. Convert the log file into preferred data type, in this case into a .csv file
  4. For the ease of accesss, the .csv file has already been generated.
  5. Input the data into DNN and get the desired output.
  6. Parameters like accuracy, precision, recall and f1 score can be displayed and based on the values of these parameters, the model can further be optimized.