Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning

被引:6
作者
Ngo, Mao, V [1 ]
Tram Truong-Huu [2 ]
Rabadi, Dima [3 ]
Loo, Jia Yi [4 ]
Teo, Sin G. [4 ]
机构
[1] Singapore Univ Technol & Design, Singapore, Singapore
[2] Singapore Inst Technol, Singapore, Singapore
[3] Penn State Shenango, Sharon, PA 16146 USA
[4] ASTAR, Inst Infocomm Res, Singapore, Singapore
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT I, ACNS 2023 | 2023年 / 13905卷
关键词
Knowledge distillation; deep learning; 1D-CNN; machine learning; static malware analysis; dynamic malware analysis;
D O I
10.1007/978-3-031-33488-7_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In malware detection, dynamic analysis extracts the run-time behavior of malware samples in a controlled environment and static analysis extracts features using reverse engineering tools. While the former faces the challenges of anti-virtualization and evasive behavior of malware samples, the latter faces the challenges of code obfuscation. To tackle these drawbacks, prior works proposed to develop detection models by aggregating dynamic and static features, thus leveraging the advantages of both approaches. However, simply concatenating dynamic and static features raises an issue of imbalanced contribution due to the heterogeneous dimensions of feature vectors to the performance of malware detection models. Yet, dynamic analysis is a time-consuming task and requires a secure environment, leading to detection delays and high costs for maintaining the analysis infrastructure. In this paper, we first introduce a method of constructing aggregated features via concatenating latent features learned through deep learning with equally-contributed dimensions. We then develop a knowledge distillation technique to transfer knowledge learned from aggregated features by a teacher model to a student model trained only on static features and use the trained student model for the detection of new malware samples. We carry out extensive experiments with a dataset of 86 709 samples including both benign and malware samples. The experimental results show that the teacher model trained on aggregated features constructed by our method outperforms the state-of-the-art models with an improvement of up to 2.38% in detection accuracy. The distilled student model not only achieves high performance (97.81% in terms of accuracy) as that of the teacher model but also significantly reduces the detection time (from 70 046.6 ms to 194.9 ms) without requiring dynamic analysis.
引用
收藏
页码:503 / 531
页数:29
相关论文
共 36 条
[1]  
Abhishek S., 2013, Technical report
[2]  
[Anonymous], 2022, horsicq GitHub: Detect it easy, or abbreviated "die"is a program for determining types of files
[3]  
[Anonymous], Oracle VirtualBox
[4]  
Bucila C., 2006, Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, P535, DOI DOI 10.1145/1150402.1150464
[5]  
contributors T.X., Extreme gradient boosting open-source software library
[6]   A comparison of static, dynamic, and hybrid analysis for malware detection [J].
Damodaran A. ;
Troia F.D. ;
Visaggio C.A. ;
Austin T.H. ;
Stamp M. .
Journal of Computer Virology and Hacking Techniques, 2017, 13 (01) :1-12
[7]  
Directorate N.R., Ghidra: a software reverse engineering (SRE) suite of tools in support of the cybersecurity mission
[8]   Malicious sequential pattern mining for automatic malware detection [J].
Fan, Yujie ;
Ye, Yanfang ;
Chen, Lifei .
EXPERT SYSTEMS WITH APPLICATIONS, 2016, 52 :16-25
[9]  
Han S, 2016, Arxiv, DOI arXiv:1510.00149
[10]   MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics [J].
Han, Weijie ;
Xue, Jingfeng ;
Wang, Yong ;
Huang, Lu ;
Kong, Zixiao ;
Mao, Limin .
COMPUTERS & SECURITY, 2019, 83 :208-233