Deep Learning for Zero-day Malware Detection and Classification: A Survey

被引:28
作者
Deldar, Fatemeh [1 ]
Abadi, Mahdi [1 ]
机构
[1] Tarbiat Modares Univ, Dept Comp Engn, Jalal Al e Ahmad Hwy, Tehran 1411713116, Iran
基金
美国国家科学基金会;
关键词
Zero-day malware; malware detection and classification; unsupervised; semi-supervised; few-shot; adversarial resistant; deep learning; NEURAL-NETWORKS; FRAMEWORK; ATTACKS; ALGORITHMS;
D O I
10.1145/3605775
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Zero-day malware is malware that has never been seen before or is so new that no anti-malware software can catch it. This novelty and the lack of existing mitigation strategies make zero-day malware challenging to detect and defend against. In recent years, deep learning has become the dominant and leading branch of machine learning in various research fields, including malware detection. Considering the significant threat of zero-day malware to cybersecurity and business continuity, it is necessary to identify deep learning techniques that can somehow be effective in detecting or classifying such malware. But so far, such a comprehensive review has not been conducted. In this article, we study deep learning techniques in terms of their ability to detect or classify zero-day malware. Based on our findings, we propose a taxonomy and divide different zero-day resistant, deep malware detection and classification techniques into four main categories: unsupervised, semi-supervised, few-shot, and adversarial resistant. We compare the techniques in each category in terms of various factors, including deep learning architecture, feature encoding, platform, detection or classification functionality, and whether the authors have performed a zero-day evaluation. We also provide a summary view of the reviewed papers and discuss their main characteristics and challenges.
引用
收藏
页数:37
相关论文
共 146 条
[71]  
Liu C, 2021, PROCEEDINGS OF THE THIRTIETH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2021, P1512
[72]  
Liu Chen, 2022, IEEE Trans. Depend. Sec. Comput.
[73]   Deep Learning for Android Malware Defenses: A Systematic Literature Review [J].
Liu, Yue ;
Tantithamthavorn, Chakkrit ;
Li, Li ;
Liu, Yepang .
ACM COMPUTING SURVEYS, 2023, 55 (08)
[74]   Research on unsupervised feature learning for Android malware detection based on Restricted Boltzmann Machines [J].
Liu, Zhen ;
Wang, Ruoyu ;
Japkowicz, Nathalie ;
Tang, Deyu ;
Zhang, Wenbin ;
Zhao, Jie .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 120 :91-108
[75]   Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder [J].
Mahdavifar, Samaneh ;
Alhadidi, Dima ;
Ghorbani, Ali. A. .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (01)
[76]   Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning [J].
Mahdavifar, Samaneh ;
Kadir, Andi Fitriah Abdul ;
Fatemi, Rasool ;
Alhadidi, Dima ;
Ghorbani, Ali A. .
2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, :515-522
[77]  
MaleVis Dataset, 2019, MaleVis: A Dataset for Vision Based Malware Recognition
[78]  
Mandiant, 2022, Technical Report
[79]   Android malware detection through hybrid features fusion and ensemble classifiers: The AndroPyTool framework and the OmniDroid dataset [J].
Martin, Alejandro ;
Lara-Cabrera, Raul ;
Camacho, David .
INFORMATION FUSION, 2019, 52 :128-142
[80]   N-BaIoT-Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders [J].
Meidan, Yair ;
Bohadana, Michael ;
Mathov, Yael ;
Mirsky, Yisroel ;
Shabtai, Asaf ;
Breitenbacher, Dominik ;
Elovici, Yuval .
IEEE PERVASIVE COMPUTING, 2018, 17 (03) :12-22