A review of deep learning based malware detection techniques

被引:3
作者
Wang, Huijuan [1 ]
Cui, Boyan [1 ]
Yuan, Quanbo [1 ,2 ]
Shi, Ruonan [1 ]
Huang, Mengying [1 ]
机构
[1] North China Inst Aerosp Engn, Langfang 065000, Peoples R China
[2] Tianjin Univ, Tianjin 300072, Peoples R China
关键词
Malware detection; Deep learning; Malware datasets; CLASSIFICATION; FRAMEWORK;
D O I
10.1016/j.neucom.2024.128010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the popularization of computer technology, the number of malware has increased dramatically in recent years. Some malware can threaten the network security of users by downloading and installing, and even spreading widely on the Internet, causing consequences such as private data leakage in the operating system, extortion, and network paralysis. In order to deal with these threats, researchers analyze malicious samples through various analysis techniques, which are usually divided into static and dynamic analysis based on the principle of whether the code needs to be executed or not. This paper analyzes in detail several classical methods of feature extraction in malware detection techniques. With the technological development of artificial intelligence, deep learning is gradually being introduced into malware detection, which does not require the identification of professional security personnel and greatly improves the generalization ability of detection. In the paper, text-based detection methods, image visualization-based detection, and graph structure-based detection techniques are reviewed according to different feature extraction methods. In addition, the paper compares 26 datasets that have been commonly used in recent years applied in the research field and explains the main contents and specifications of the datasets. Finally, a summary and outlook of the malware research field is given.
引用
收藏
页数:19
相关论文
共 124 条
[1]   Malicious Code Detection: Run Trace Output Analysis by LSTM [J].
Acarturk, Cengiz ;
Sirlanci, Melih ;
Balikcioglu, Pinar Gurkan ;
Demirci, Deniz ;
Sahin, Nazenin ;
Kucuk, Ozge Acar .
IEEE ACCESS, 2021, 9 :9625-9635
[2]   Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [J].
Ahmadi, Mansour ;
Ulyanov, Dmitry ;
Semenov, Stanislav ;
Trofimov, Mikhail ;
Giacinto, Giorgio .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :183-194
[3]   Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach [J].
Alasmary, Hisham ;
Khormali, Aminollah ;
Anwar, Afsah ;
Park, Jeman ;
Choi, Jinchun ;
Abusnaina, Ahmed ;
Awad, Amro ;
Nyang, Daehun ;
Mohaisen, Aziz .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8977-8988
[4]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[5]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[6]   A New Malware Classification Framework Based on Deep Learning Algorithms [J].
Aslan, Omer ;
Yilmaz, Abdullah Asim .
IEEE ACCESS, 2021, 9 :87936-87951
[7]   A Comprehensive Review on Malware Detection Approaches [J].
Aslan, Omer ;
Samet, Refik .
IEEE ACCESS, 2020, 8 :6249-6271
[8]  
AVLTeam, 2017, Android malware analysis report
[9]  
Awais M., 2023, 2023 4 INT C ADV COM, P1
[10]   Easy Data Augmentation for Improved Malware Detection: A Comparative Study [J].
Bae, Jangseong ;
Lee, Changki .
2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP 2021), 2021, :214-218