Cryptocurrency malware hunting: A deep Recurrent Neural Network approach

被引:67
|
作者
Yazdinejad, Abbas [1 ]
HaddadPajouh, Hamed [1 ]
Dehghantanha, Ali [1 ]
Parizi, Reza M. [2 ]
Srivastava, Gautam [3 ,4 ]
Chen, Mu-Yen [5 ]
机构
[1] Univ Guelph, Sch Comp Sci, Cyber Sci Lab, Guelph, ON, Canada
[2] Kennesaw State Univ, Coll Comp & Software Engn, Kennesaw, GA 30144 USA
[3] Brandon Univ, Dept Math & Comp Sci, Brandon, MB, Canada
[4] China Med Univ, Res Ctr Interneural Comp, Taichung 40402, Taiwan
[5] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 701, Taiwan
关键词
Cryptocurrency; Malware; Threats; Threat-hunting; Long Short-Term Memory; Deep learning; Text-mining; Static analysis; Real-world; Applications;
D O I
10.1016/j.asoc.2020.106630
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, cryptocurrency trades have increased dramatically, and this trend has attracted cyber-threat actors to exploit the existing vulnerabilities and infect their targets. The malicious actors use cryptocurrency malware to perform complex computational tasks using infected devices. Since cryptocurrency malware threats perform a legal process, it is a challenging task to detect this type of threat by a manual or heuristic method. In this paper, we propose a novel deep Recurrent Neural Network (RNN) learning model for hunting cryptocurrency malware threats. Specifically, our proposed model utilizes the RNN to analyze Windows applications' operation codes (Opcodes) as a case study. We collect a real-world dataset that comprises of 500 cryptocurrency malware and 200 benign-ware samples, respectively. The proposed model trains with five different Long Short-Term Memory (LSTM) structures and is evaluated by a 10-fold cross-validation (CV) technique. The obtained results prove that a 3-layer configuration model gains 98% of detection accuracy, which is the highest rate among other current configurations. We also applied traditional machine learning (ML) classifiers to show the applicability of deep learners (LSTM) versus traditional models in dealing with cryptocurrency malware. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Cryptocurrency Price Prediction with Convolutional Neural Network and Stacked Gated Recurrent Unit
    Kang, Chuen Yik
    Lee, Chin Poo
    Lim, Kian Ming
    DATA, 2022, 7 (11)
  • [22] Reformulating Level Sets as Deep Recurrent Neural Network Approach to Semantic Segmentation
    Hoang Ngan Le, T.
    Kha Gia Quach
    Khoa Luu
    Chi Nhan Duong
    Savvides, Marios
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2018, 27 (05) : 2393 - 2407
  • [23] Malware detection approach based on deep convolutional neural networks
    El Merabet, Hoda
    Hajraoui, Abderrahmane
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 20 (1-2) : 145 - 157
  • [24] Deep Recurrent Neural Network for Seizure Detection
    Vidyaratne, L.
    Glandon, A.
    Alam, M.
    Iftekharuddin, K. M.
    2016 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2016, : 1202 - 1207
  • [25] ArDHO-deep RNN: autoregressive deer hunting optimization based deep recurrent neural network in investigating atmospheric and oceanic parameters
    Raj, Sundeep
    Tripathi, Sandesh
    Tripathi, K. C.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (06) : 7561 - 7588
  • [26] ArDHO-deep RNN: autoregressive deer hunting optimization based deep recurrent neural network in investigating atmospheric and oceanic parameters
    Sundeep Raj
    Sandesh Tripathi
    K. C. Tripathi
    Multimedia Tools and Applications, 2022, 81 : 7561 - 7588
  • [27] An Enhanced Deep Learning Neural Network for the Detection and Identification of Android Malware
    Musikawan, Pakarat
    Kongsorot, Yanika
    You, Ilsun
    So-In, Chakchai
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) : 8560 - 8577
  • [28] Research on Malware Variant Detection Method Based on Deep Neural Network
    Xing Jianhua
    Si Jing
    Zhang Yongjing
    Li Wei
    Zheng Yuning
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 144 - 147
  • [29] Classifying Malware Traffic Using Images and Deep Convolutional Neural Network
    Davis Jr, R. E.
    Xu, Jingsheng
    Roy, Kaushik
    IEEE ACCESS, 2024, 12 : 58031 - 58038
  • [30] A PLS-SEM Neural Network Approach for Understanding Cryptocurrency Adoption
    Sohaib, Osama
    Hussain, Walayat
    Asif, Muhammad
    Ahmad, Muhammad
    Mazzara, Manuel
    IEEE ACCESS, 2020, 8 : 13138 - 13150