CAG-Malconv: A Byte-Level Malware Detection Method With CBAM and Attention-GRU

被引:0
作者
Luo, Xi [1 ]
Fan, Honghui [1 ]
Yin, Lihua [1 ]
Jia, Shijie [2 ]
Zhao, Kaiyan [1 ]
Yang, Hongyu [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Key Lab Cyberspace Secur Def, Beijing 100045, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2024年 / 21卷 / 05期
基金
国家重点研发计划; 美国国家科学基金会;
关键词
Malware; Feature extraction; Static analysis; Deep learning; Analytical models; Accuracy; Ransomware; Cybersecurity; malware detection; deep learning; byte-level features; interpretability;
D O I
10.1109/TNSM.2024.3424565
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rise of generative artificial intelligence, malware creation has become more accessible, leading to a surge in malware and its variants. Traditional detection methods struggle to keep pace with this evolution. Dynamic analysis, though detailed, is resource intensive and susceptible to variations in computer hardware and simulation environments. Static analysis, on the other hand, faces the challenge of discerning valuable features from an extensive pool, especially for software across diverse architectures. To tackle these issues, we propose a binary sample classification approach based on raw bytes, named CAG-Malconv, which incorporates Convolutional Block Attention Module (CBAM) and Bidirectional Gated Recurrent Unit (BiGRU) to extract byte-level features. We evaluated it on two datasets with 48,000 samples of different file types and families. It outperforms state-of-the-art methods based on advanced features and raw bytes in terms of accuracy (ACC), Area Under the Curve (AUC), F1 score, and recall. Furthermore, it allows for the visualization of raw samples, facilitating the precise identification of malicious components like C&C URLs and encryption loops by analyzing activation patterns in hidden layers, thus streamlining malware investigative procedures.
引用
收藏
页码:5859 / 5872
页数:14
相关论文
共 34 条
  • [1] [Anonymous], 2015, Microsoft malware classification challenge (big 2015)
  • [2] Bahdanau D, 2016, Arxiv, DOI arXiv:1409.0473
  • [3] A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learning
    Bhat, Parnika
    Behal, Sunny
    Dutta, Kamlesh
    [J]. COMPUTERS & SECURITY, 2023, 130
  • [4] Explaining AI for Malware Detection: Analysis of Mechanisms of MalConv
    Bose, Shamik
    Barao, Timothy
    Liu, Xiuwen
    [J]. 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,
  • [5] Cabau G, 2016, INT SYMP SYMB NUMERI, P315, DOI [10.1109/SYNASC.2016.057, 10.1109/SYNASC.2016.51]
  • [6] Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware
    Canfora, Gerardo
    De Lorenzo, Andrea
    Medvet, Eric
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 333 - 340
  • [7] Chen C.-M., 2020, inAdvances in Information andCommunication, P774
  • [8] Cho KYHY, 2014, Arxiv, DOI arXiv:1409.1259
  • [9] Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
  • [10] Islam R., 2010, Proceedings Second Cybercrime and Trustworthy Computing Workshop (CTC 2010), P9, DOI 10.1109/CTC.2010.11