Deep Learning for Zero-day Malware Detection and Classification: A Survey

被引:17
作者
Deldar, Fatemeh [1 ]
Abadi, Mahdi [1 ]
机构
[1] Tarbiat Modares Univ, Dept Comp Engn, Jalal Al e Ahmad Hwy, Tehran 1411713116, Iran
基金
美国国家科学基金会;
关键词
Zero-day malware; malware detection and classification; unsupervised; semi-supervised; few-shot; adversarial resistant; deep learning; NEURAL-NETWORKS; FRAMEWORK; ATTACKS; ALGORITHMS;
D O I
10.1145/3605775
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Zero-day malware is malware that has never been seen before or is so new that no anti-malware software can catch it. This novelty and the lack of existing mitigation strategies make zero-day malware challenging to detect and defend against. In recent years, deep learning has become the dominant and leading branch of machine learning in various research fields, including malware detection. Considering the significant threat of zero-day malware to cybersecurity and business continuity, it is necessary to identify deep learning techniques that can somehow be effective in detecting or classifying such malware. But so far, such a comprehensive review has not been conducted. In this article, we study deep learning techniques in terms of their ability to detect or classify zero-day malware. Based on our findings, we propose a taxonomy and divide different zero-day resistant, deep malware detection and classification techniques into four main categories: unsupervised, semi-supervised, few-shot, and adversarial resistant. We compare the techniques in each category in terms of various factors, including deep learning architecture, feature encoding, platform, detection or classification functionality, and whether the authors have performed a zero-day evaluation. We also provide a summary view of the reviewed papers and discuss their main characteristics and challenges.
引用
收藏
页数:37
相关论文
共 146 条
  • [31] Devon Hjelm R., 2018, P 6 INT C LEARN REPR
  • [32] Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis
    Fan, Ming
    Liu, Jun
    Luo, Xiapu
    Chen, Kai
    Tian, Zhenzhou
    Zheng, Qinghua
    Liu, Ting
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) : 1890 - 1905
  • [33] Malware classification for the cloud via semi-supervised transfer learning
    Gao, Xianwei
    Hu, Changzhen
    Shan, Chun
    Liu, Baoxu
    Niu, Zequn
    Xie, Hui
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [34] The rise of machine learning for detection and classification of malware: Research developments, trends and challenges
    Gibert, Daniel
    Mateu, Carles
    Planes, Jordi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 153 (153)
  • [35] Generative Adversarial Networks
    Goodfellow, Ian
    Pouget-Abadie, Jean
    Mirza, Mehdi
    Xu, Bing
    Warde-Farley, David
    Ozair, Sherjil
    Courville, Aaron
    Bengio, Yoshua
    [J]. COMMUNICATIONS OF THE ACM, 2020, 63 (11) : 139 - 144
  • [36] Goodfellow Ian, 2015, 3 INT C LEARN REPR I, P3
  • [37] Grosse K, 2016, Arxiv, DOI [arXiv:1606.04435, DOI 10.48550/ARXIV.1606.04435]
  • [38] Adversarial Examples for Malware Detection
    Grosse, Kathrin
    Papernot, Nicolas
    Manoharan, Praveen
    Backes, Michael
    McDaniel, Patrick
    [J]. COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 62 - 79
  • [39] Recent advances in convolutional neural networks
    Gu, Jiuxiang
    Wang, Zhenhua
    Kuen, Jason
    Ma, Lianyang
    Shahroudy, Amir
    Shuai, Bing
    Liu, Ting
    Wang, Xingxing
    Wang, Gang
    Cai, Jianfei
    Chen, Tsuhan
    [J]. PATTERN RECOGNITION, 2018, 77 : 354 - 377
  • [40] Hamid B, 2024, Arxiv, DOI arXiv:2110.03301