MalViT: An Approach to Enhancing Malware Detection

被引:0
作者
Roshan, N. R. K. [1 ]
Barik, Debarghya [1 ]
Roseline, S. Abijah [1 ]
机构
[1] SRMIST, Dept Computat Intelligence, KTR, Chennai, India
来源
2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024 | 2024年
关键词
Malware detection; Malware Images; Deep Learning; Vision Transformer Model; Malware classification; Vision-based analysis; Static analysis; Dynamic analysis;
D O I
10.1109/ACCAI61061.2024.10601747
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing ubiquity of computer systems and web services, the cybersecurity landscape faces an evergrowing challenge proposed by sophisticated and elusive forms of malware. Recent reports have highlighted the emergence of a new type of file-less malware that infects users' systems while leaving no obvious trace on the hard drives. Traditional methods namely the signature-based and heuristic detection have proven increasingly inadequate as malware creators continually devise novel evasion strategies. Hence, there is an urgent requirement for pioneering malware detection methods. In response to this escalating threat, this paper proposes a cutting-edge approach to malware detection, capitalizing on the transformative capabilities of the Vision Transformer (ViT) model. The malware files are converted into image representations and ViT is employed for the classification task, distinguishing between malicious and benign files. This approach not only promises to enhance detection accuracy but also addresses the pressing need for adaptability to ever-evolving malware variants.
引用
收藏
页数:8
相关论文
共 17 条
  • [1] A Comprehensive Review on Malware Detection Approaches
    Aslan, Omer
    Samet, Refik
    [J]. IEEE ACCESS, 2020, 8 : 6249 - 6271
  • [2] Bazrafshan Z, 2013, 2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), P113, DOI 10.1109/IKT.2013.6620049
  • [3] Global-Local Attention-Based Butterfly Vision Transformer for Visualization-Based Malware Classification
    Belal, Mohamad Mulham
    Sundaram, Divya Meena
    [J]. IEEE ACCESS, 2023, 11 : 69337 - 69355
  • [4] Chandra A., 2014, ARXIV PREPRINT ARXIV, DOI DOI 10.48550/ARXIV.1406.7061
  • [5] A comprehensive survey on deep learning based malware detection techniques
    Gopinath, M.
    Sethuraman, Sibi Chakkaravarthy
    [J]. COMPUTER SCIENCE REVIEW, 2023, 47
  • [6] SDIF-CNN: Stacking deep image features using fine-tuned convolution neural network models for real-world malware detection and classification
    Kumar, Sanjeev
    Panda, Kajal
    [J]. APPLIED SOFT COMPUTING, 2023, 146
  • [7] Classification of malware families based on runtime behaviors
    Pektas, Abdurrahman
    Acarman, Tankut
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 37 : 91 - 100
  • [8] Rahman M, 2024, CNN vs Transformer Variants: Malware Classification Using Binary Malware Images, DOI [10.1109/COMNETSAT59769.2023.10420585, DOI 10.1109/COMNETSAT59769.2023.10420585]
  • [9] Self-Supervised Vision Transformers for Malware Detection
    Seneviratne, Sachith
    Shariffdeen, Ridwan
    Rasnayaka, Sanka
    Kasthuriarachchi, Nuran
    [J]. IEEE ACCESS, 2022, 10 : 103121 - 103135
  • [10] Sethi K., 2019, Framework," 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), P1, DOI [10.1109/CyberSecPODS.2019.8885196, DOI 10.1109/CYBERSECPODS.2019.8885196]