Malware Classification Using Convolutional Fuzzy Neural Networks Based on Feature Fusion and the Taguchi Method

被引:2
作者
Lin, Cheng-Jian [1 ]
Huang, Min-Su [1 ]
Lee, Chin-Ling [2 ]
机构
[1] Natl Chin Yi Univ Technol, Dept Comp Sci & Informat Engn, Taichung 411, Taiwan
[2] Natl Taichung Univ Sci & Technol, Dept Int Business, Taichung 404, Taiwan
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 24期
关键词
malware image classification; convolutional neural network; fuzzy theory; Taguchi method; feature fusion; SYSTEM;
D O I
10.3390/app122412937
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The applications of computer networks are increasingly extensive, and networks can be remotely controlled and monitored. Cyber hackers can exploit vulnerabilities and steal crucial data or conduct remote surveillance through malicious programs. The frequency of malware attacks is increasing, and malicious programs are constantly being updated. Therefore, more effective malware detection techniques are being developed. In this paper, a convolutional fuzzy neural network (CFNN) based on feature fusion and the Taguchi method is proposed for malware image classification; this network is referred to as FT-CFNN. Four fusion methods are proposed for the FT-CFNN, namely global max pooling fusion, global average pooling fusion, channel global max pooling fusion, and channel global average pooling fusion. Data are fed into this network architecture and then passed through two convolutional layers and two max pooling layers. The feature fusion layer is used to reduce the feature size and integrate the network information. Finally, a fuzzy neural network is used for classification. In addition, the Taguchi method is used to determine optimal parameter combinations to improve classification accuracy. This study used the Malimg dataset to evaluate the accuracy of the proposed classification method. The accuracy values exhibited by the proposed FT-CFNN, proposed CFNN, and original LeNet model in malware family classification were 98.61%, 98.13%, and 96.68%, respectively.
引用
收藏
页数:14
相关论文
共 33 条
[1]  
A Constant State of Flux: Trend Micro, 2020, ANN CYBERSECURITY RE
[2]  
Alsmadi Tibra, 2021, 2021 International Conference on Information Technology (ICIT), P371, DOI 10.1109/ICIT52682.2021.9491765
[3]  
[Anonymous], 2017, MCAFEE REPORT MCAFEE
[4]  
[Anonymous], KASPERSKY REPORT KAS
[5]   MSIC: Malware Spectrogram Image Classification [J].
Azab, Ahmad ;
Khasawneh, Mahmoud .
IEEE ACCESS, 2020, 8 :102007-102021
[6]  
Garcia FCC, 2016, Arxiv, DOI arXiv:1609.07770
[7]  
Chen ZS, 2021, Arxiv, DOI arXiv:2201.07649
[8]   A comparison of static, dynamic, and hybrid analysis for malware detection [J].
Damodaran A. ;
Troia F.D. ;
Visaggio C.A. ;
Austin T.H. ;
Stamp M. .
Journal of Computer Virology and Hacking Techniques, 2017, 13 (01) :1-12
[9]   Behavior-based features model for malware detection [J].
Galal H.S. ;
Mahdy Y.B. ;
Atiea M.A. .
Journal of Computer Virology and Hacking Techniques, 2016, 12 (02) :59-67
[10]   Malware detection based on semi-supervised learning with malware visualization [J].
Gao, Tan ;
Zhao, Lan ;
Li, Xudong ;
Chen, Wen .
MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2021, 18 (05) :5995-6011