Continual Semi-Supervised Malware Detection

被引:1
作者
Chin, Matthew [1 ]
Corizzo, Roberto [1 ]
机构
[1] Amer Univ, Dept Comp Sci, Washington, DC 20016 USA
关键词
continual learning; malware detection; semi-supervised learning; one-class learning; anomaly detection;
D O I
10.3390/make6040135
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detecting malware has become extremely important with the increasing exposure of computational systems and mobile devices to online services. However, the rapidly evolving nature of malicious software makes this task particularly challenging. Despite the significant number of machine learning works for malware detection proposed in the last few years, limited interest has been devoted to continual learning approaches, which could allow models to showcase effective performance in challenging and dynamic scenarios while being computationally efficient. Moreover, most of the research works proposed thus far adopt a fully supervised setting, which relies on fully labelled data and appears to be impractical in a rapidly evolving malware landscape. In this paper, we address malware detection from a continual semi-supervised one-class learning perspective, which only requires normal/benign data and empowers models with a greater degree of flexibility, allowing them to detect multiple malware types with different morphology. Specifically, we assess the effectiveness of two replay strategies on anomaly detection models and analyze their performance in continual learning scenarios with three popular malware detection datasets (CIC-AndMal2017, CIC-MalMem-2022, and CIC-Evasive-PDFMal2022). Our evaluation shows that replay-based strategies can achieve competitive performance in terms of continual ROC-AUC with respect to the considered baselines and bring new perspectives and insights on this topic.
引用
收藏
页码:2829 / 2854
页数:26
相关论文
共 59 条
[1]   MFMCNS: a multi-feature and multi-classifier network-based system for ransomworm detection [J].
Almashhadani, Ahmad O. ;
Carlin, Domhnall ;
Kaiiali, Mustafa ;
Sezer, Sakir .
COMPUTERS & SECURITY, 2022, 121
[2]  
Andrychowicz Marcin., 2017, HINDSIGHT EXPERIENCE
[3]   Ransomware: Recent advances, analysis, challenges and future research directions [J].
Beaman, Craig ;
Barkworth, Ashley ;
Akande, Toluwalope David ;
Hakak, Saqib ;
Khan, Muhammad Khurram .
COMPUTERS & SECURITY, 2021, 111
[4]   A survey of malware detection using deep learning [J].
Bensaoud, Ahmed ;
Kalita, Jugal ;
Bensaoud, Mahmoud .
MACHINE LEARNING WITH APPLICATIONS, 2024, 16
[5]   LOF: Identifying density-based local outliers [J].
Breunig, MM ;
Kriegel, HP ;
Ng, RT ;
Sander, J .
SIGMOD RECORD, 2000, 29 (02) :93-104
[6]   Rethinking Experience Replay: Bag of Tricks for Continual Learning [J].
Buzzega, Pietro ;
Boschini, Matteo ;
Porrello, Angelo ;
Calderara, Simone .
2020 25TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2021, :2180-2187
[7]   Detecting Obfuscated Malware using Memory Feature Engineering [J].
Carrier, Tristan ;
Victor, Princy ;
Tekeoglu, Ali ;
Lashkari, Arash Habibi .
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, :177-188
[8]  
Cossu A., 2021, arXiv, DOI [10.48550/ARXIV.2112.02925, DOI 10.3389/FRAI.2022.829842]
[9]   Continual Prototype Evolution: Learning Online from Non-Stationary Data Streams [J].
De lange, Matthias ;
Tuytelaars, Tinne .
2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, :8230-8239
[10]  
D¡az-Rodr¡guez N, 2018, Arxiv, DOI arXiv:1810.13166