PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection

被引:18
|
作者
Won, Dong-Ok
Jang, Yong-Nam
Lee, Seong-Whan [1 ]
机构
[1] Hallym Univ, Dept Artificial Intelligence Convergence, Chunchon 24252, South Korea
关键词
Malware; Generative adversarial networks; Generators; Training; Training data; Big Data; Linear programming; Analogous malware detection; generative adversarial networks; malware augmentation; malware data; zero-day malware; NEURAL-NETWORK;
D O I
10.1109/TETC.2022.3170544
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Zero-day malicious software (malware) refers to a previously unknown or newly discovered software vulnerability. The fundamental objective of this paper is to enhance detection for analogous zero-day malware by efficient learning to plausible generated data. To detect zero-day malware, we proposed a malware training framework based on the generated analogous malware data using generative adversarial networks (PlausMal-GAN). Thus, the PlausMal-GAN can suitably produce analogous zero-day malware images with high quality and high diversity from the existing malware data. The discriminator, as a detector, learns various malware features using both real and generated malware images. In terms of performance, the proposed framework showed higher and more stable performances for the analogous zero-day malware images, which can be assumed to be analogous zero-day malware data. We obtained reliable accuracy performances in the proposed PlausMal-GAN framework with representative GAN models (i.e., deep convolutional GAN, least-squares GAN, Wasserstein GAN with gradient penalty, and evolutionary GAN). These results indicate that the use of the proposed framework is beneficial for the detection and prediction of numerous and analogous zero-day malware data from noted malware when developing and updating malware detection systems.
引用
收藏
页码:82 / 94
页数:13
相关论文
共 16 条
  • [1] Big Data Framework for Zero-Day Malware Detection
    Gupta, Deepak
    Rani, Rinkle
    CYBERNETICS AND SYSTEMS, 2018, 49 (02) : 103 - 121
  • [2] Malware detection method based on image analysis and generative adversarial networks
    Liu, Yanhua
    Li, Jiaqi
    Liu, Baoxu
    Gao, Xiaoling
    Liu, Ximeng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (22)
  • [3] A survey of zero-day malware attacks and its detection methodology
    Radhakrishnan, Kiran
    Menon, Rajeev R.
    Nath, Hiran V.
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 533 - 539
  • [4] Deep Learning for Zero-day Malware Detection and Classification: A Survey
    Deldar, Fatemeh
    Abadi, Mahdi
    ACM COMPUTING SURVEYS, 2024, 56 (02)
  • [5] Zero-Day Malware Classification and Detection Using Machine Learning
    Kumar J.
    Rajendran B.
    Sudarsan S.D.
    SN Computer Science, 5 (1)
  • [6] Towards Optimizing Malware Detection: An Approach Based on Generative Adversarial Networks and Transformers
    Alzahem, Ayyub
    Boulila, Wadii
    Driss, Maha
    Koubaa, Anis
    Almomani, Iman
    COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2022, 2022, 13501 : 598 - 610
  • [7] A Multifaceted Deep Generative Adversarial Networks Model for Mobile Malware Detection
    Alotaibi, Fahad Mazaed
    Fawad
    APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [8] Deep Convolutional Generative Adversarial Networks in Image-Based Android Malware Detection
    Mercaldo, Francesco
    Martinelli, Fabio
    Santone, Antonella
    COMPUTERS, 2024, 13 (06)
  • [9] Robustness of Image-Based Malware Classification Models trained with Generative Adversarial Networks
    Reilly, Ciaran
    O'Shaughnessy, Stephen
    Thorpe, Christina
    PROCEEDINGS OF THE 2023 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2023, 2023, : 92 - 99
  • [10] Mecha: A Neural-Symbolic Open-Set Homogeneous Decision Fusion Approach for Zero-Day Malware Similarity Detection
    Molloy, Christopher
    Banks, Jeremy
    Ding, Steven H. H.
    Alaca, Furkan
    Charland, Philippe
    Walenstein, Andrew
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2025, 51 (02) : 621 - 637