Research Article

A Malware Detection Scheme Based on Mining Format Information

Table 6

Experimental results for all classification algorithms (the datasets are divided into the training set and the test set in chronological order).

Feature selection methodThe number of featuresAlgorithmTPR (%)FPR (%)Accuracy (%)AUC

Filter20J4890.72.194.60.928
Random forest94.71.596.70.993
Adaboost (J48)93.11.496.00.993
Bagging (J48)91.31.595.10.969

Wrapper20Random forest96.51.397.60.994