A Hybrid Attention Network for Malware Detection Based on Multi-Feature Aligned and Fusion

被引:5
作者
Yang, Xing [1 ]
Yang, Denghui [1 ]
Li, Yizhou [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610207, Peoples R China
关键词
multi-feature fusion; malware detection; static analysis; attention; deep neural network; FRAMEWORK;
D O I
10.3390/electronics12030713
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread use of computers, the amount of malware has increased exponentially. Since dynamic detection is costly in both time and resources, most existing malware detection methods are based on static features. However, existing static methods mainly rely on single feature types of malware, while few pay attention to multi-feature fusion. This paper presents a novel multi-feature extraction and fusion method to effectively detect malware variants by combining binary and opcode features. We propose a stacked convolutional network to capture the temporal and discontinuity information in the function call of the binary file from malware. Additionally, we adopt the triangular attention algorithm to extract code-level features from assembly code. Additionally, these two extracted features are aligned and fused by the cross-attention, which could provide a stable feature representation. We evaluate our method on two different datasets. It achieves an accuracy of 0.9954 on the Kaggle Malware Classification dataset and an accuracy of 0.9544 on a large real-world dataset. To optimize our detection model, we conduct in-depth discussions on different feature extractors and multi-feature fusion strategies. Moreover, a visualized attention module in our model is provided to explain its superiority in the opcode feature extraction. An experimental analysis is performed against five baseline deep learning models and five state-of-the-art malware detection models, which reveals that our strategy outperforms competing approaches in all evaluation circumstances.
引用
收藏
页数:21
相关论文
共 37 条
[1]   Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [J].
Ahmadi, Mansour ;
Ulyanov, Dmitry ;
Semenov, Stanislav ;
Trofimov, Mikhail ;
Giacinto, Giorgio .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :183-194
[2]  
[Anonymous], 2009, P 18 C USENIX SECURI, DOI DOI 10.1093/MP/SSQ045
[3]  
[Anonymous], 2012, Secur. Inform, DOI DOI 10.1186/2190-8532-1-1
[4]   PbMMD: A novel policy based multi-process malware detection [J].
Bidoki, Seyyed Mojtaba ;
Jalili, Saeed ;
Tajoddin, Asghar .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 60 :57-70
[5]  
Chai YH, 2020, INT WIREL COMMUN, P463, DOI 10.1109/IWCMC48107.2020.9148289
[6]   CrossViT: Cross-Attention Multi-Scale Vision Transformer for Image Classification [J].
Chen, Chun-Fu ;
Fan, Quanfu ;
Panda, Rameswar .
2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, :347-356
[7]   Scanning memory with Yara [J].
Cohen, Michael .
DIGITAL INVESTIGATION, 2017, 20 :34-43
[8]  
de Oliveira A.S., 2023, Authorea Prepr, DOI [10.5120/ijca2021921218, DOI 10.5120/IJCA2021921218]
[9]  
Dosovitskiy A, 2021, Arxiv, DOI arXiv:2010.11929
[10]   Improving the Detection of Malware Behaviour Using Simplified Data Dependent API Call Graph [J].
Elhadi, Ammar Ahmed E. ;
Maarof, Mohd Aizaini ;
Barry, Bazara I. A. .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05) :29-42