DLGraph: Malware Detection Using Deep Learning and Graph Embedding

被引:21
作者
Jiang, Haodi [1 ]
Turki, Turki [2 ]
Wang, Jason T. L. [1 ]
机构
[1] New Jersey Inst Technol, Dept Comp Sci, Newark, NJ 07102 USA
[2] King Abdulaziz Univ, Dept Comp Sci, POB 80221, Jeddah 21589, Saudi Arabia
来源
2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA) | 2018年
关键词
malware detection; function-call graphs; Windows API calls; NETWORK;
D O I
10.1109/ICMLA.2018.00168
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we present a new approach, named DLGraph, for malware detection using deep learning and graph embedding. DLGraph employs two stacked denoising autoencoders (SDAs) for representation learning, taking into consideration computer programs' function-call graphs and Windows application programming interface (API) calls. Given a program, we first use a graph embedding technique that maps the program's function-call graph to a vector in a low-dimensional feature space. One SDA in our deep learning model is used to learn a latent representation of the embedded vector of the function-call graph. The other SDA in our model is used to learn a latent representation of the given program'sWindows API calls. The two learned latent representations are then merged to form a combined feature vector. Finally, we use softmax regression to classify the combined feature vector for predicting whether the given program is malware or not. Experimental results based on different datasets demonstrate the effectiveness of the proposed approach and its superiority over a related method.
引用
收藏
页码:1029 / 1033
页数:5
相关论文
共 27 条
[1]  
[Anonymous], 2018, KAFANBBS
[2]  
[Anonymous], 2012, Technical Report
[3]  
[Anonymous], 2018, HEX RAYS IDA PRO DIS
[4]  
[Anonymous], 2018, MICROSOFT MALWARE CL
[5]  
[Anonymous], 2018, VirusTotal
[6]  
Aycock J., 2006, Computer Viruses and Malware, V22
[7]   On the possibility of practically obfuscating programs towards a unified perspective of code protection [J].
Beaucamps, Philippe ;
Filiol, Eric .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (01) :3-21
[8]   A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications [J].
Cai, HongYun ;
Zheng, Vincent W. ;
Chang, Kevin Chen-Chuan .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2018, 30 (09) :1616-1637
[9]  
David O.E., 2015, 2015 INT JOINT C NEU, P1, DOI DOI 10.1109/IJCNN.2015.7280815
[10]   A Survey on Automated Dynamic Malware-Analysis Techniques and Tools [J].
Egele, Manuel ;
Scholte, Theodoor ;
Kirda, Engin ;
Kruegel, Christopher .
ACM COMPUTING SURVEYS, 2012, 44 (02)