Skip to content

A LSTM (Long Short Term Memory) model + dataset. Utilises the procmon logging system to analyze malware/virus process activity in the form of binary classification [malicious/benign]. Created for my University final project.

Notifications You must be signed in to change notification settings

e-war/LSTMalware

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Procmon LSTM Automatic analysis

Beholder LSTM Logo

What is it?

A LSTM (Long Short Term Memory) model + dataset. Utilises the procmon logging system to determine malicious process activity in the form of binary classification [malicious/benign]. Created for my University final project.

What do i need?

The program requires procmon logs in .csv format, the headings "Process Name","Image Path","Operation","Path","Result","Detail","Duration","TID" must be included and should be in cronological order.

Python requirements:

  • tensorflow
  • keras
  • numpy
  • sklearn
  • csv

Todo:

  • create requirements.txt file
  • seperate training / dataset processing
  • Allow saving of processed datasets

About

A LSTM (Long Short Term Memory) model + dataset. Utilises the procmon logging system to analyze malware/virus process activity in the form of binary classification [malicious/benign]. Created for my University final project.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published