Design and Performance Analysis of an Anti-Malware System Based on Generative Adversarial Network Framework

被引:4
作者
Khan, Faiza Babar [1 ]
Durad, Muhammad Hanif [1 ]
Khan, Asifullah [2 ,3 ]
Khan, Farrukh Aslam [4 ]
Rizwan, Muhammad [1 ]
Ali, Aftab [5 ]
机构
[1] Pakistan Inst Engn & Appl Sci PIEAS, Dept Comp & Informat Sci DCIS, CIPMA Lab, Islamabad 45650, Pakistan
[2] Pakistan Inst Engn & Appl Sci PIEAS, Dept Comp & Informat Sci DCIS, Pattern Recognit Lab, Nilore, Islamabad 45650, Pakistan
[3] Pakistan Inst Engn & Appl Sci PIEAS, PIEAS Artificial Intelligence Ctr PAIC, Islamabad 45650, Pakistan
[4] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11653, Saudi Arabia
[5] Ulster Univ, Sch Comp, Belfast BT15 1ED, North Ireland
关键词
Malware; Generative adversarial networks; Support vector machines; Machine learning; Generators; Terminology; Training; Performance evaluation; Anti-malware system; generative adversarial networks; malware sandboxes; malware; unpacker; performance; CLASSIFICATION;
D O I
10.1109/ACCESS.2024.3358454
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cyber realm is overwhelmed with dynamic malware that promptly penetrates all defense mechanisms, operates unapprehended to the user, and covertly causes damage to sensitive data. The current generation of cyber users is being victimized by the interpolation of malware each day due to the pervasive progression of Internet connectivity. Malware is dispersed to infiltrate the security, privacy, and integrity of the system. Conventional malware detection systems do not have the potential to detect novel malware without the accessibility of their signatures, which gives rise to a high False Negative Rate (FNR). Previously, there were numerous attempts to address the issue of malware detection, but none of them effectively combined the capabilities of signature-based and machine learning-based detection engines. To address this issue, we have developed an integrated Anti-Malware System (AMS) architecture that incorporates both conventional signature-based detection and AI-based detection modules. Our approach employs a Generative Adversarial Network (GAN) based Malware Classifier Optimizer (MCOGAN) framework, which can optimize a malware classifier. This framework utilizes GANs to generate fabricated benign files that can be used to train external discriminators for optimization purposes. We describe our proposed framework and anti-malware system in detail to provide a better understanding of how a malware detection system works. We evaluate our approach using the Figshare dataset and state-of-the-art models as discriminators. Our results showcase enhanced malware detection performance, yielding a 10% performance boost, thus affirming the efficacy of our approach compared to existing models.
引用
收藏
页码:27683 / 27708
页数:26
相关论文
共 77 条
[1]  
Ahmed F., 2009, P 2 ACM WORKSHOP SEC, P55, DOI DOI 10.1145/1654988.1655003
[2]  
Akarsh S, 2019, INT CONF ADVAN COMPU, P666, DOI [10.1109/ICACCS.2019.8728544, 10.1109/icaccs.2019.8728544]
[3]  
Amjad Naeem, 2018, 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), P106, DOI 10.1109/WETICE.2018.00027
[4]   Graph-based malware detection using dynamic analysis [J].
Anderson, Blake ;
Quist, Daniel ;
Neil, Joshua ;
Storlie, Curtis ;
Lane, Terran .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04) :247-258
[5]  
Anderson J., 2016, Autonomous Vehicle Technology, P13
[6]  
[Anonymous], 2012, Secur. Inform, DOI DOI 10.1186/2190-8532-1-1
[7]  
[Anonymous], MICROSOFT SECURITY I
[8]  
[Anonymous], 2015, JUST IN TIME MALWARE
[9]  
ASAM SJ, 2021, APPLSCI, V11, P10464
[10]   A New Malware Classification Framework Based on Deep Learning Algorithms [J].
Aslan, Omer ;
Yilmaz, Abdullah Asim .
IEEE ACCESS, 2021, 9 :87936-87951