A review of deep learning based malware detection techniques

被引:3
作者
Wang, Huijuan [1 ]
Cui, Boyan [1 ]
Yuan, Quanbo [1 ,2 ]
Shi, Ruonan [1 ]
Huang, Mengying [1 ]
机构
[1] North China Inst Aerosp Engn, Langfang 065000, Peoples R China
[2] Tianjin Univ, Tianjin 300072, Peoples R China
关键词
Malware detection; Deep learning; Malware datasets; CLASSIFICATION; FRAMEWORK;
D O I
10.1016/j.neucom.2024.128010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the popularization of computer technology, the number of malware has increased dramatically in recent years. Some malware can threaten the network security of users by downloading and installing, and even spreading widely on the Internet, causing consequences such as private data leakage in the operating system, extortion, and network paralysis. In order to deal with these threats, researchers analyze malicious samples through various analysis techniques, which are usually divided into static and dynamic analysis based on the principle of whether the code needs to be executed or not. This paper analyzes in detail several classical methods of feature extraction in malware detection techniques. With the technological development of artificial intelligence, deep learning is gradually being introduced into malware detection, which does not require the identification of professional security personnel and greatly improves the generalization ability of detection. In the paper, text-based detection methods, image visualization-based detection, and graph structure-based detection techniques are reviewed according to different feature extraction methods. In addition, the paper compares 26 datasets that have been commonly used in recent years applied in the research field and explains the main contents and specifications of the datasets. Finally, a summary and outlook of the malware research field is given.
引用
收藏
页数:19
相关论文
共 124 条
[11]   A Malware and Variant Detection Method Using Function Call Graph Isomorphism [J].
Bai, Jinrong ;
Shi, Qibin ;
Mu, Shiguang .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
[12]   Malicious code detection in android: the role of sequence characteristics and disassembling methods [J].
Balikcioglu, Pinar G. ;
Sirlanci, Melih ;
Kucuk, Ozge A. ;
Ulukapi, Bulut ;
Turkmen, Ramazan K. ;
Acarturk, Cengiz .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (01) :107-118
[13]  
Bazaar, 2023, Bazaar.n.dWeb
[14]  
Bhodia N, 2019, Arxiv, DOI arXiv:1903.11551
[15]  
Catak F.O., 2019, BENCHMARK API CALL D, DOI DOI 10.48550/ARXIV.1905.01999
[16]   Deep learning based Sequential model for malware analysis using Windows exe API Calls [J].
Catak, Ferhat Ozgur ;
Yaz, Ahmet Faruk ;
Elezaj, Ogerta ;
Ahmed, Javed .
PEERJ COMPUTER SCIENCE, 2020,
[17]  
Celdran A. Huertas, 2022, Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities, P193
[18]   Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection [J].
Chai, Yuhan ;
Du, Lei ;
Qiu, Jing ;
Yin, Lihua ;
Tian, Zhihong .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (05) :4754-4766
[19]   Generating Adversarial Examples for Static PE Malware Detector Based on Deep Reinforcement Learning [J].
Chen, Jun ;
Jiang, Jingfei ;
Li, Rongchun ;
Dou, Yong .
5TH ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2020), 2020, 1575
[20]  
Cheng JM, 2021, J BRAZ SOC MECH SCI, V43, DOI [10.1007/s40430-021-03257-1, 10.13393/j.cnki.issn.1672-948X.2021.03.001]