An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis

被引:0
作者
Wang, Huozhu [1 ,2 ]
Zhu, Ziyuan [1 ,2 ]
Tong, Zhongkai [1 ,2 ]
Yin, Xiang [1 ,2 ]
Feng, Yusi [1 ,2 ]
Shi, Gang [1 ,2 ]
Meng, Dan [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) | 2021年
关键词
Artificial Intelligence; Cybersecurity; Malware detection; Recurrent Neural Network; Interpretability;
D O I
10.1109/IJCNN52387.2021.9534115
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The next generation attackers often generate malware variants with Artificial Intelligence (AI) weapons, which are deliberately designed to evade antivirus engines. Security defenders propose many AI-based approaches to detect the massive number of malware variants. However, most AI-based malware detection approaches only output a label to users, and these labels are mainly unexplainable. The lack of transparency has introduced many black-box attacks. Malware developers can develop adversarial examples to evade these AI-based malware detection systems. In this paper, we propose an effective approach for malware detection and explanation, which can locate malicious code snippets by explaining the malware classifier decision result. To this end, firstly, we get the system call number sequence of the target sample with instrumentation tools in an elaborated sandbox. Secondly, we feed the mapped system call number sequence into a deep learning model to make a decision on whether the target sample is benign or malicious. Thirdly, we adopt the Layer-wise Relevance Propagation algorithm to find which slice of a sequence makes the greatest contribution in the decision. Our evaluation demonstrates that our approach achieves high classification accuracy (97.39%), reduces the neural network size by 20 times, and saves the malware analyst time to locate malicious code snippets.
引用
收藏
页数:10
相关论文
共 42 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]   A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence [J].
Amer, Eslam ;
Zelinka, Ivan .
COMPUTERS & SECURITY, 2020, 92
[3]  
Anderson HS, 2018, CORR
[4]  
[Anonymous], 2016, BIRMINGHAM MUMBAI PA
[5]  
[Anonymous], 2013, INMIC
[6]  
[Anonymous], 2009, WOOT09 PROCEEDINGS O
[7]  
[Anonymous], 2020, ICDCS
[8]  
[Anonymous], 2020, VALGRIND DOCUMENTATI
[9]  
[Anonymous], 2018, BLACKHAT
[10]  
[Anonymous], 2020, BLACKHAT