Image-based Malware Detection through a Deep Neuro-Fuzzy Model

被引:0
作者
Mercaldo, Francesco [1 ,2 ]
Martinelli, Fabio [2 ]
Santone, Antonella [1 ]
机构
[1] Univ Molise, Campobasso, Italy
[2] CNR, Inst Informat & Telemat, Natl Res Council Italy, Pisa, Italy
来源
2023 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, FUZZ | 2023年
关键词
malware; fuzzy; deep learning; artificial intelligence; security; testing;
D O I
10.1109/FUZZ52849.2023.10309775
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
From ransomware, able to cipher data and ask for a ransom to have back access to own files, to spyware, developed to collect private and sensitive information regarding the user's activity without his consent, in the current malware landscape there is a huge variety of malicious payloads aimed to perpetrate damage. Current antimalware, mainly based on the signature principle, require that the signature of a threat must be stored in the antimalware database, in order to identify (and try to remove) the infection: for this reason, they are unable to detect zero-day threats. Considering that in the literature there are several methods adopting machine learning to detect malware, in this paper we propose a deep neuro-fuzzy network for malware detection. An accuracy equal to 0.935 is obtained in the evaluation of more than 20000 real-world malware (belonging to 10 different categories) and trusted applications, demonstrating the effectiveness of the proposed deep neuro-fuzzy model for malware detection.
引用
收藏
页数:7
相关论文
共 40 条
  • [1] AP/Reuters, 2021, Cyber attack on us fuel pipeline operator blamed on darkside, a 'robin hood' criminal gang
  • [2] DeepVisDroid: android malware detection by hybridizing image-based features with deep learning techniques
    Bakour, Khaled
    Unver, Halil Murat
    [J]. NEURAL COMPUTING & APPLICATIONS, 2021, 33 (18) : 11499 - 11516
  • [3] Bosun O., 2021, The biggest cyber hacks of 2021
  • [4] Canfora G., 2015, Detecting Android malware using sequences of system calls, P13, DOI [10.1145/2804345.2804349, DOI 10.1145/2804345.2804349]
  • [5] Casolare Rosangela, 2022, Procedia Computer Science, P145, DOI 10.1016/j.procs.2022.09.047
  • [6] Casolare R., 2021, J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl., V12, P44
  • [7] Casolare R., 2020, P 15 INT C AV REL SE, P1
  • [8] Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences
    Casolare, Rosangela
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    [J]. INFORMATION, 2020, 11 (06)
  • [9] Casolare R, 2019, IEEE INT CONF BIG DA, P5998, DOI 10.1109/BigData47090.2019.9006094
  • [10] Chen L, 2018, Arxiv, DOI arXiv:1812.07606