CNN- and GAN-based classification of malicious code families: A code visualization approach

被引:20
作者
Wang, Ziyue [1 ]
Wang, Weizheng [2 ]
Yang, Yaoqi [3 ]
Han, Zhaoyang [1 ]
Xu, Dequan [4 ]
Su, Chunhua [1 ]
机构
[1] Univ Aizu, Div Comp Sci, Fukushima 9658580, Japan
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong 999077, Peoples R China
[3] Army Engn Univ PLA, Coll Commun Engn, Nanjing, Peoples R China
[4] Guizhou Univ, Sch Comp Sci & Technol, Guiyang, Peoples R China
关键词
code visualization; convolutional neural networks; generative adversarial networks; malware detection; ANDROID MALWARE DETECTION; IOT MALWARE;
D O I
10.1002/int.23094
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malicious code attacks have severely hindered the current development of the Internet technologies. Once the devices are infected with virus, the damages to companies and users are unpredictable. Although researchers have developed malware detection methods, the analysis result still cannot achieve the desired accuracy due to complicated malicious code families and fast-growing variants. In this paper, to solve this problem, we combine Convolutional Neural Networks (CNNs) with Generative Adversarial Networks (GANs) to design an efficient and accurate malware detection method. First, we implement a code visualization method and utilize GAN to generate more samples of malicious code variants in the role of data augmentation. Then, the lightweight AlexNet originated from CNN to classify malware families. Finally, simulation experiments are conducted to evaluate that our CNN plus GAN model can achieve a higher classification accuracy (i.e., 97.78%) compared with some related work.
引用
收藏
页码:12472 / 12489
页数:18
相关论文
共 38 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]   Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers [J].
Alasmary, Hisham ;
Abusnaina, Ahmed ;
Jang, Rhongho ;
Abuhamad, Mohammed ;
Anwar, Afsah ;
Nyang, DaeHun ;
Mohaisen, David .
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, :888-898
[3]   Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach [J].
Alasmary, Hisham ;
Khormali, Aminollah ;
Anwar, Afsah ;
Park, Jeman ;
Choi, Jinchun ;
Abusnaina, Ahmed ;
Awad, Amro ;
Nyang, Daehun ;
Mohaisen, Aziz .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8977-8988
[4]  
[Anonymous], 2017, SYMANTEC CORP
[5]   Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01) :88-95
[6]   Detection of Malicious Code Variants Based on Deep Learning [J].
Cui, Zhihua ;
Xue, Fei ;
Cai, Xingjuan ;
Cao, Yang ;
Wang, Gai-ge ;
Chen, Jinjun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (07) :3187-3196
[7]  
David OE, 2015, IEEE IJCNN
[8]   A Lightweight Blockchain-Based Remote Mutual Authentication for AI-Empowered IoT Sustainable Computing Systems [J].
Deebak, B. D. ;
Memon, Fida Hussain ;
Khowaja, Sunder Ali ;
Dev, Kapal ;
Wang, Weizheng ;
Qureshi, Nawab Muhammad Faseeh ;
Su, Chunhua .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (08) :6652-6660
[9]   Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection [J].
Demontis, Ambra ;
Melis, Marco ;
Biggio, Battista ;
Maiorca, Davide ;
Arp, Daniel ;
Rieck, Konrad ;
Corona, Igino ;
Giacinto, Giorgio ;
Roli, Fabio .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) :711-724
[10]   A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution [J].
Dib, Mirabelle ;
Torabi, Sadegh ;
Bou-Harb, Elias ;
Assi, Chadi .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02) :1165-1177