| Algorithm 1: Malware Classification Using Transfer Learning and Texture Features | |
| Input | PCAP |
| Output | Malware Classification |
| Step 1: | Set P= {, , …, }s, where is P is a Packets |
| Step 2: | |
| Compute PCAP from , where | |
| Selects NF from PCAP, where NF is the required Network Flows | |
| Display/Select HTTP + TCP | |
| Step 3: | Select HTTP traces and TCP flows |
| Step 4: | Tokenize and filter HTTP and TCP flows = Clean features |
| Step 5: | Apply word embedding |
| BERT transformers = Train feature | |
| Extraction = Textual trained features | |
| Step 6: | Trained files = Trained features as |
| Step 7: | Compute B from PCAP, where for Bytes |
| Compute , where is Image | |
| Decomposed in , where | |
| Apply FAST extractor & BRIEF descriptor on | |
| Step 8: | Generate texture features from the combination of FAST and BRIEF |
| Step 9: | Get Texture features as |
| Step 10: | Combine (Textual and texture features) |
| Step 11: | Apply SMOTE classing balancing on , |
| Compute , from , , where , are Balanced Textural and Texture features |
|
| to apply CNN technique of trained features | |
| , to apply CNN technique of texture features | |
| Step 12: | Calculate Deep Features as DF |
| Step 13: | Apply Voting-based ensemble learning on DF |
| Step 14: | Result: Malware or Benign |
| Step 15: | Finish |