Malware Classification Using Few-Shot Learning Approach

被引:2
作者
Alfarsi, Khalid [1 ]
Rasheed, Saim [1 ]
Ahmad, Iftikhar [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Informat Technol, Jeddah 21589, Saudi Arabia
关键词
few-shot learning (FSL); Prototypical; malware detection; cyber-attack; classification algorithms;
D O I
10.3390/info15110722
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware detection, targeting the microarchitecture of processors, has recently come to light as a potentially effective way to improve computer system security. Hardware Performance Counter data are used by machine learning algorithms in security mechanisms, such as hardware-based malware detection, to categorize and detect malware. It is crucial to determine whether or not a file contains malware. Many issues have been brought about by the rise in malware, and businesses are losing vital data and dealing with other issues. The second thing to keep in mind is that malware can quickly cause a lot of damage to a system by slowing it down and encrypting a large amount of data on a personal computer. This study provides extensive details on a flexible framework related to machine learning and deep learning techniques using few-shot learning. Malware detection is possible using DT, RF, LR, SVM, and FSL techniques. The logic is that these algorithms make it simple to differentiate between files that are malware-free and those that are not. This indicates that their goal is to reduce the number of false positives in the data. For this, we use two different datasets from an online platform. In this research work, we mainly focus on few-shot learning techniques by using two different datasets. The proposed model has an 97% accuracy rate, which is much greater than that of other techniques.
引用
收藏
页数:22
相关论文
共 43 条
[1]   Malware Detection Issues, Challenges, and Future Directions: A Survey [J].
Aboaoja, Faitouri A. ;
Zainal, Anazida ;
Ghaleb, Fuad A. ;
Al-rimy, Bander Ali Saleh ;
Eisa, Taiseer Abdalla Elfadil ;
Elnour, Asma Abbas Hassan .
APPLIED SCIENCES-BASEL, 2022, 12 (17)
[2]   Malware classification and composition analysis: A survey of recent developments [J].
Abusitta, Adel ;
Li, Miles Q. ;
Fung, Benjamin C. M. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
[3]   A Comprehensive Review on Malware Detection Approaches [J].
Aslan, Omer ;
Samet, Refik .
IEEE ACCESS, 2020, 8 :6249-6271
[4]  
Bedi Punam, 2020, Procedia Computer Science, V171, P780, DOI 10.1016/j.procs.2020.04.085
[5]  
Bohrer J.d.S., 2020, arXiv
[6]   Binned Data Provide Better Imputation of Missing Time Series Data from Wearables [J].
Chakrabarti, Shweta ;
Biswas, Nupur ;
Karnani, Khushi ;
Padul, Vijay ;
Jones, Lawrence D. ;
Kesari, Santosh ;
Ashili, Shashaanka .
SENSORS, 2023, 23 (03)
[7]  
Chehal D., 2023, Informatica, V47, P373, DOI [10.31449/inf.v47i3.4156, DOI 10.31449/INF.V47I3.4156]
[8]   Combined kNN Classification and Hierarchical Similarity Hash for Fast Malware Detection [J].
Choi, Sunoh .
APPLIED SCIENCES-BASEL, 2020, 10 (15)
[9]   A few-shot malware classification approach for unknown family recognition using malware feature visualization [J].
Conti, Mauro ;
Khandhar, Shubham ;
Vinod, P. .
COMPUTERS & SECURITY, 2022, 122
[10]  
Fernndez A., 2018, Learning from imbalanced data sets