Malware identification using visualization images and deep learning

被引:179
作者
Ni, Sang [1 ]
Qian, Quan [1 ,2 ]
Zhang, Rui [1 ]
机构
[1] Shanghai Univ, Sch Comp Engn & Sci, Shanghai 200444, Peoples R China
[2] Shanghai Univ, Shanghai Inst Adv Commun & Data Sci, Shanghai 200444, Peoples R China
基金
上海市自然科学基金;
关键词
Network security; Malware; Visual analysis; Deep learning;
D O I
10.1016/j.cose.2018.04.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, malware is one of the most serious threats to Internet security. In this paper we propose a malware classification algorithm that uses static features called MCSC (Malware Classification using SimHash and CNN) which converts the disassembled malware codes into gray images based on SimHash and then identifies their families by convolutional neural network. During this process, some methods such as multi-hash, major block selection and bilinear interpolation are used to improve the performance. Experimental results show that MCSC is very effective for malware family classification, even for those unevenly distributed samples. The classification accuracy can be 99.260% at best and 98.862% at average on a malware dataset of 10,805 samples which is higher than other compared algorithms. Moreover, for MCSC, on average, it just takes 1.41 s to recognize a new sample, which can meet the requirements in most of the practical applications. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:871 / 885
页数:17
相关论文
共 36 条
[1]  
Anderson B, 2011, GRAPH BASED MALWARE, P247
[2]  
[Anonymous], 2015, Microsoft Malware Classification Challenge (Big 2015)
[3]  
[Anonymous], 2012, 2012 ACM RES APPL CO
[4]  
Arefkhani M, 2015, 2015 9TH IRANIAN CONFERENCE ON MACHINE VISION AND IMAGE PROCESSING (MVIP), P214, DOI 10.1109/IranianMVIP.2015.7397539
[5]  
Bayer U., 2009, 16 ANN NETW DISTR SY
[6]  
Charikar Moses S., 2002, P 34 ANN ACM S THEOR, P380, DOI [DOI 10.1145/509907.509965, 10.1145/509907.509965]
[7]  
Cohen WW., 1995, P 12 INT C MACH LEAR, V1995, P115, DOI [DOI 10.1016/B978-1-55860-377-6.50023-2, 10.1016/b978-1-55860-377-6.50023-2, 10.1016/B978-1-55860-377-6.50023-2]
[8]  
Fujino A, 2015, CONSUM COMM NETWORK, P140, DOI 10.1109/CCNC.2015.7157960
[10]  
Gandotra E, 2014, MALWARE ANAL CLASSIF, P56