A Hybrid Attention Network for Malware Detection Based on Multi-Feature Aligned and Fusion

被引:4
作者
Yang, Xing [1 ]
Yang, Denghui [1 ]
Li, Yizhou [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610207, Peoples R China
关键词
multi-feature fusion; malware detection; static analysis; attention; deep neural network; FRAMEWORK;
D O I
10.3390/electronics12030713
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of computers, the amount of malware has increased exponentially. Since dynamic detection is costly in both time and resources, most existing malware detection methods are based on static features. However, existing static methods mainly rely on single feature types of malware, while few pay attention to multi-feature fusion. This paper presents a novel multi-feature extraction and fusion method to effectively detect malware variants by combining binary and opcode features. We propose a stacked convolutional network to capture the temporal and discontinuity information in the function call of the binary file from malware. Additionally, we adopt the triangular attention algorithm to extract code-level features from assembly code. Additionally, these two extracted features are aligned and fused by the cross-attention, which could provide a stable feature representation. We evaluate our method on two different datasets. It achieves an accuracy of 0.9954 on the Kaggle Malware Classification dataset and an accuracy of 0.9544 on a large real-world dataset. To optimize our detection model, we conduct in-depth discussions on different feature extractors and multi-feature fusion strategies. Moreover, a visualized attention module in our model is provided to explain its superiority in the opcode feature extraction. An experimental analysis is performed against five baseline deep learning models and five state-of-the-art malware detection models, which reveals that our strategy outperforms competing approaches in all evaluation circumstances.
引用
收藏
页数:21
相关论文
共 37 条
  • [1] Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
    Ahmadi, Mansour
    Ulyanov, Dmitry
    Semenov, Stanislav
    Trofimov, Mikhail
    Giacinto, Giorgio
    [J]. CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 183 - 194
  • [2] [Anonymous], 2012, Secur. Inform, DOI DOI 10.1186/2190-8532-1-1
  • [3] [Anonymous], 2009, P 18 C USENIX SECURI, DOI DOI 10.1093/MP/SSQ045
  • [4] PbMMD: A novel policy based multi-process malware detection
    Bidoki, Seyyed Mojtaba
    Jalili, Saeed
    Tajoddin, Asghar
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 60 : 57 - 70
  • [5] Chai YH, 2020, INT WIREL COMMUN, P463, DOI 10.1109/IWCMC48107.2020.9148289
  • [6] CrossViT: Cross-Attention Multi-Scale Vision Transformer for Image Classification
    Chen, Chun-Fu
    Fan, Quanfu
    Panda, Rameswar
    [J]. 2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 347 - 356
  • [7] Scanning memory with Yara
    Cohen, Michael
    [J]. DIGITAL INVESTIGATION, 2017, 20 : 34 - 43
  • [8] de Oliveira A.S., 2023, Authorea Prepr, DOI [10.5120/ijca2021921218, DOI 10.5120/IJCA2021921218]
  • [9] Dosovitskiy A, 2021, Arxiv, DOI [arXiv:2010.11929, DOI 10.48550/ARXIV.2010.11929, 10.48550/arXiv.2010.11929]
  • [10] Improving the Detection of Malware Behaviour Using Simplified Data Dependent API Call Graph
    Elhadi, Ammar Ahmed E.
    Maarof, Mohd Aizaini
    Barry, Bazara I. A.
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 29 - 42