Conservative Novelty Synthesizing Network for Malware Recognition in an Open-Set Scenario

被引:5
作者
Guo, Jingcai [1 ,2 ]
Guo, Song [2 ]
Ma, Shiheng [3 ]
Sun, Yuxia [4 ]
Xu, Yuanyuan [5 ]
机构
[1] Southwestern Univ Finance & Econ, Sch Econ & Informat Engn, Chengdu 611130, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
[3] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China
[4] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Peoples R China
[5] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
基金
中国国家自然科学基金;
关键词
Malware; Training; Image recognition; Support vector machines; Task analysis; Computer vision; Character recognition; Classification; cyber security; generative model; malware recognition; neural networks; APPS;
D O I
10.1109/TNNLS.2021.3099122
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We study the challenging task of malware recognition on both known and novel unknown malware families, called malware open-set recognition (MOSR). Previous works usually assume the malware families are known to the classifier in a close-set scenario, i.e., testing families are the subset or at most identical to training families. However, novel unknown malware families frequently emerge in real-world applications, and as such, require recognizing malware instances in an open-set scenario, i.e., some unknown families are also included in the test set, which has been rarely and nonthoroughly investigated in the cyber-security domain. One practical solution for MOSR may consider jointly classifying known and detecting unknown malware families by a single classifier (e.g., neural network) from the variance of the predicted probability distribution on known families. However, conventional well-trained classifiers usually tend to obtain overly high recognition probabilities in the outputs, especially when the instance feature distributions are similar to each other, e.g., unknown versus known malware families, and thus, dramatically degrade the recognition on novel unknown malware families. To address the problem and construct an applicable MOSR system, we propose a novel model that can conservatively synthesize malware instances to mimic unknown malware families and support a more robust training of the classifier. More specifically, we build upon the generative adversarial networks to explore and obtain marginal malware instances that are close to known families while falling into mimical unknown ones to guide the classifier to lower and flatten the recognition probabilities of unknown families and relatively raise that of known ones to rectify the performance of classification and detection. A cooperative training scheme involving the classification, synthesizing and rectification are further constructed to facilitate the training and jointly improve the model performance. Moreover, we also build a new large-scale malware dataset, named MAL-100, to fill the gap of lacking a large open-set malware benchmark dataset. Experimental results on two widely used malware datasets and our MAL-100 demonstrate the effectiveness of our model compared with other representative methods.
引用
收藏
页码:662 / 676
页数:15
相关论文
共 55 条
  • [1] Anderson H. S., 2018, ARXIV180404637
  • [2] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
    Arp, Daniel
    Spreitzenbarth, Michael
    Huebner, Malte
    Gascon, Hugo
    Rieck, Konrad
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [3] Towards Open Set Deep Networks
    Bendale, Abhijit
    Boult, Terrance E.
    [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 1563 - 1572
  • [4] Burnaev E, 2016, INT CONF DAT MIN WOR, P273, DOI [10.1109/ICDMW.2016.157, 10.1109/ICDMW.2016.0046]
  • [5] Cauwenberghs G, 2001, ADV NEUR IN, V13, P409
  • [6] Recent progress on the removal of antibiotic pollutants using photocatalytic oxidation process
    Chen, Yanxi
    Yang, Jingling
    Zeng, Lixi
    Zhu, Mingshan
    [J]. CRITICAL REVIEWS IN ENVIRONMENTAL SCIENCE AND TECHNOLOGY, 2022, 52 (08) : 1401 - 1448
  • [7] Malicious code detection based on CNNs and multi-objective algorithm
    Cui, Zhihua
    Du, Lei
    Wang, Penghong
    Cai, Xingjuan
    Zhang, Wensheng
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 129 : 50 - 58
  • [8] Detection of Malicious Code Variants Based on Deep Learning
    Cui, Zhihua
    Xue, Fei
    Cai, Xingjuan
    Cao, Yang
    Wang, Gai-ge
    Chen, Jinjun
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (07) : 3187 - 3196
  • [9] Dahl GE, 2013, INT CONF ACOUST SPEE, P3422, DOI 10.1109/ICASSP.2013.6638293
  • [10] De Haan L., 2007, EXTREME VALUE THEORY