Malware Detection using API Calls Visualisations and Convolutional Neural Networks

被引:0
作者
Pizarro Barona, Jaime [1 ]
Avila Alvarez, Joseph [1 ]
Jimenez Farfan, Carlos [1 ]
Marquez Aguilar, Joangie [1 ]
Bonilla, Rafael I. [1 ]
机构
[1] Escuela Super Politecn Litoral, Fac Ingn Elect & Computac, Guayaquil, Ecuador
来源
2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW | 2023年
关键词
malware detection; API calls; artificial intelligence; deep learning; convolutional neural networks;
D O I
10.1109/CCGridW59191.2023.00037
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research explores and analyzes different API Calls sequence transformation methods into images to train deep learning models and determine which combination of these methods and models performs better. We generated images from API Calls sequences using Simhash and FreqSeq. The results were compared by training two well-known Convolutional Network architectures (ResNet50v2 and MobileNetv2). This work presents our experience running these experiments highlighting the results obtained and the challenges we faced.
引用
收藏
页码:153 / 159
页数:7
相关论文
共 35 条
[1]  
[Anonymous], 2015, ICLR
[2]  
[Anonymous], 2010, 2010 INT C BROADBAND, DOI DOI 10.1109/BWCCA.2010.85
[3]  
Banin S., 2016, Tech. Rep.
[4]   Catch them alive: A malware detection approach through memory forensics, manifold learning and computer vision [J].
Bozkir, Ahmet Selman ;
Tahillioglu, Ersan ;
Aydos, Murat ;
Kara, Ilker .
COMPUTERS & SECURITY, 2021, 103
[5]  
Buyrukbilen Sahin, 2014, Secure Data Management. 10th VLDB Workshop, SDM 2013. Proceedings, P61, DOI 10.1007/978-3-319-06811-4_12
[6]  
Carletti V., 2021, ROBUSTNESS EVALUATIO
[7]   Xception: Deep Learning with Depthwise Separable Convolutions [J].
Chollet, Francois .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :1800-1807
[8]   A malware classification method based on memory dump grayscale image [J].
Dai, Yusheng ;
Li, Hui ;
Qian, Yekui ;
Lu, Xidong .
DIGITAL INVESTIGATION, 2018, 27 :30-37
[9]  
Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
[10]  
Diazgranados H., CIBERATAQUES AM LATI