Research Article

Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks

Table 3

Experimental results with the PDF dataset, where the two values of each cell are of ‘benign’ and ‘malicious’, respectively.

ModelPrecisionRecallF1

DT96.00 / 90.3089.70 / 96.3092.70 / 93.20
NB88.40 / 99.7099.70 / 87.0093.70 / 92.90
SVM94.70 / 98.9099.00 / 94.4096.80 / 96.60
RF93.50 / 99.4099.40 / 93.1096.40 / 96.10

Emb+Conv+Conv+Pool+FC99.76 / 100.097.37 / 97.3798.48 / 98.65
Conv+Conv+Pool+FC99.78 / 100.092.62 / 97.2795.71 / 98.61
Emb+Conv+Pool+FC99.73 / 100.094.94 / 97.7897.12 / 98.87
Emb+Conv+Conv+FC99.67 / 100.097.78 / 92.3298.55 / 96.00
Emb+Conv+Conv+Conv+Pool+FC99.70 / 100.092.21 / 95.3595.36 / 97.60