Few-Shot Learning With Prototypical Networks for Improved Memory Forensics

被引:0
作者
Malik, Muhammad Fahad [1 ]
Gul, Ammara [2 ]
Saadia, Ayesha [3 ]
Alserhani, Faeiz M. [4 ]
机构
[1] Air Univ, Dept Cyber Secur, Islamabad 44000, Pakistan
[2] Birmingham City Univ, Fac Comp Engn & Built Environm CEBE, Birmingham B5 5JU, England
[3] Air Univ, Dept Comp Sci, Islamabad 44000, Pakistan
[4] Jouf Univ, Coll Comp & Informat Sci, Dept Comp Engn & Networks, Sakaka 72388, Al Jowf, Saudi Arabia
关键词
Malware; Forensics; Random access memory; Training; Few shot learning; Accuracy; Prototypes; Machine learning; Feature extraction; Computer crime; Malware detection; memory forensics; few-shot learning; prototypical networks;
D O I
10.1109/ACCESS.2025.3565802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing computer systems requires effective methods for malware detection. Memory forensics analyzes memory dumps to identify malicious activity, but faces challenges including large and complex datasets, constantly evolving malware threats, and limited labeled data for training algorithms among others. This research introduces a novel approach for malware detection using memory forensics and prototypical networks. As the first application of prototypical networks to the Dumpware10 dataset (to the best of authors knowledge), our findings highlight the potential of few-shot learning for memory forensics-based malware detection, opening new avenues for research in this domain. Prototypical networks are a type of few-shot learning algorithm that excels at classifying new categories with minimal examples. Utilizing the publicly available Dumpware10 dataset, which includes 10 malware classes and one benign class, we preprocess memory dumps using denoising and A-Hash functions to reduce noise and redundancy. The prototypical network is trained on the first four malware classes and the benign class. It's then tested on a dataset with one additional class (first five malware classes and the benign class). We progressively increase the number of test classes to eleven. Within each training episode, five training images are used as support samples, with all remaining images designated as query samples. Our goal isn't to predict exact class labels, but to assess the similarity between query images and prototypes using a distance metric. If the label of a prototype matches the query image and the distance falls below a threshold, it's considered a true positive. This approach achieves an average accuracy of 92% with eleven classes, the highest across all scenarios and comparable to previous work using machine and deep learning algorithms on this dataset.
引用
收藏
页码:79397 / 79409
页数:13
相关论文
共 48 条
[1]  
Ale Laha, 2020, 2020 IEEE 5th International Conference on Signal and Image Processing (ICSIP), P1001, DOI 10.1109/ICSIP49896.2020.9339429
[2]   Malware Classification Using Few-Shot Learning Approach [J].
Alfarsi, Khalid ;
Rasheed, Saim ;
Ahmad, Iftikhar .
INFORMATION, 2024, 15 (11)
[3]   Few-Shot Learning for Medical Image Segmentation Using 3D U-Net and Model-Agnostic Meta-Learning (MAML) [J].
Alsaleh, Aqilah M. ;
Albalawi, Eid ;
Algosaibi, Abdulelah ;
Albakheet, Salman S. ;
Khan, Surbhi Bhatia .
DIAGNOSTICS, 2024, 14 (12)
[4]   Unsuccessful Story about Few Shot Malware Family Classification and Siamese Network to the Rescue [J].
Bai, Yude ;
Xing, Zhenchang ;
Li, Xiaohong ;
Feng, Zhiyong ;
Ma, Duoyuan .
2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), 2020, :1560-1571
[5]   Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities [J].
Barros, Pedro H. ;
Chagas, Eduarda T. C. ;
Oliveira, Leonardo B. ;
Queiroz, Fabiane ;
Ramos, Heitor S. .
COMPUTERS & SECURITY, 2022, 120
[6]   Catch them alive: A malware detection approach through memory forensics, manifold learning and computer vision [J].
Bozkir, Ahmet Selman ;
Tahillioglu, Ersan ;
Aydos, Murat ;
Kara, Ilker .
COMPUTERS & SECURITY, 2021, 103
[7]   From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification [J].
Chai, Yuhan ;
Qiu, Jing ;
Yin, Lihua ;
Zhang, Lejun ;
Gupta, Brij B. ;
Tian, Zhihong .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04) :4248-4261
[8]   Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection [J].
Chai, Yuhan ;
Du, Lei ;
Qiu, Jing ;
Yin, Lihua ;
Tian, Zhihong .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (05) :4754-4766
[9]   Few-shot image classification based on gradual machine learning [J].
Chen, Na ;
Kuang, Xianming ;
Liu, Feiyu ;
Wang, Kehao ;
Zhang, Lijun ;
Chen, Qun .
EXPERT SYSTEMS WITH APPLICATIONS, 2024, 255
[10]  
Chui Kwok Tai, 2023, International Conference on Cyber Security, Privacy and Networking (ICSPN 2022). Lecture Notes in Networks and Systems (599), P33, DOI 10.1007/978-3-031-22018-0_4