An Efficient Deep Learning Based Approach for Malware Classification

Author(s):  
Madhurima Rana ◽  
Swathi Edem
2021 ◽  
Vol 546 ◽  
pp. 420-435
Author(s):  
Suyeon Yoo ◽  
Sungjin Kim ◽  
Seungjae Kim ◽  
Brent Byunghoon Kang

2019 ◽  
Vol 2019 ◽  
pp. 1-11
Author(s):  
Yuntao Zhao ◽  
Chunyu Xu ◽  
Bo Bo ◽  
Yongxin Feng

The increasing sophistication of malware variants such as encryption, polymorphism, and obfuscation calls for the new detection and classification technology. In this paper, MalDeep, a novel malware classification framework of deep learning based on texture visualization, is proposed against malicious variants. Through code mapping, texture partitioning, and texture extracting, we can study malware classification in a new feature space of image texture representation without decryption and disassembly. Furthermore, we built a malware classifier on convolutional neural network with two convolutional layers, two downsampling layers, and many full connection layers. We adopt the dataset, from Microsoft Malware Classification Challenge including 9 categories of malware families and 10868 variant samples, to train the model. The experiment results show that the established MalDeep has a higher accuracy rate for malware classification. In particular, for some backdoor families, the classification accuracy of the model reaches over 99%. Moreover, compared with other main antivirus software, MalDeep also outperforms others in the average accuracy for the variants from different families.


Author(s):  
Dr. Diwakar Ramanuj Tripathi

Abstract: Traditional machine learning has evolved into deep learning. It's capable of extracting the best feature representation from raw input samples. Intrusion detection, malware classification, Android malware detection, spam and phishing detection, and binary analysis are just a few examples of how this has been used in cyber security. Deep auto encoders, limited Boltzmann machines, recurrent neural networks, generative adversarial networks, and other DL methods are all described in this study in a brief tutorial-style method. After that, we'll go over how each of the DL methods is employed in security applications. Keywords: Machine, Cyber, Security, Architecture, Technology.


Author(s):  
Harisha Airbail ◽  
G. Mamatha ◽  
Rahul V. Hedge ◽  
P.R. Sushmika ◽  
Reshma Kumari ◽  
...  

2020 ◽  
Vol 92 ◽  
pp. 101740 ◽  
Author(s):  
Baoguo Yuan ◽  
Junfeng Wang ◽  
Dong Liu ◽  
Wen Guo ◽  
Peng Wu ◽  
...  

Processes ◽  
2021 ◽  
Vol 9 (6) ◽  
pp. 929
Author(s):  
Xiaoliang Zhang ◽  
Kehe Wu ◽  
Zuge Chen ◽  
Chenyi Zhang

The research on malware detection enabled by deep learning has become a hot issue in the field of network security. The existing malware detection methods based on deep learning suffer from some issues, such as weak ability of deep feature extraction, relatively complex model, and insufficient ability of model generalization. Traditional deep learning architectures, such as convolutional neural networks (CNNs) variants, do not consider the spatial hierarchies between features, and lose some information on the precise position of a feature within the feature region, which is crucial for a malware file which has specific sections. In this paper, we draw on the idea of image classification in the field of computer vision and propose a novel malware detection method based on capsule network architecture with hyper-parameter optimized convolutional layers (MalCaps), which overcomes CNNs limitations by removing the need for a pooling layer and introduces capsule layers. Firstly, the malware is transformed into a grayscale image. Then, the dynamic routing-based capsule network is used to detect and classify the image. Without advanced feature extraction and with only a small number of labeled samples, the presented method is tested on an unbalanced Microsoft Malware Classification Challenge (MMCC) dataset and experimental results produce testing accuracy of 99.34%, improving on a number of traditional deep learning models posited in recent malware classification literature.


Sign in / Sign up

Export Citation Format

Share Document