Skip to main content
. 2022 Sep 7;22(18):6766. doi: 10.3390/s22186766
Algorithm 1: Malware Classification Using Transfer Learning and Texture Features
Input PCAP
Output Malware Classification
Step 1: Set P= {p1, p2, …, pn}s, where is P is a Packets
Step 2: Decrypt P= P
Compute PCAP from  P, where  P =IP, TCP,HTTP,,n
Selects NF from PCAP, where NF is the required Network Flows
Display/Select HTTP + TCP
Step 3: Select HTTP traces and TCP flows
Step 4: Tokenize and filter HTTP and TCP flows = Clean features
Step 5: Apply word embedding
BERT transformers = Train feature
 Extraction = Textual trained features
Step 6: Trained files = Trained features as T
Step 7: Compute B =B1, B2, ., Bn  from PCAP, where B for Bytes
Compute  I, where I is Image
Decomposed I in SS1, where SS1=256 × 256
Apply FAST extractor & BRIEF descriptor on SS1
Step 8: Generate texture features from the combination of FAST and BRIEF
Step 9: Get Texture features as  T
Step 10: Combine T, T (Textual and texture features)
Step 11: Apply SMOTE classing balancing on T,  T
Compute BT, BT from T,  T, where BT, BT are Balanced Textural
and Texture features
BT=CNNT, to apply CNN technique of trained features
BT=CNN T, to apply CNN technique of texture features
Step 12: Calculate Deep Features as DF
Step 13: Apply Voting-based ensemble learning on DF
Step 14: Result: Malware or Benign
Step 15: Finish