Malware-Detection Method with a Convolutional Recurrent Neural Network Using Opcode Sequences

被引:54
作者
Jeon, Seungho [1 ]
Moon, Jongsub [1 ]
机构
[1] Korea Univ, Grad Sch Informat Secur, Div Informat Secur, Seoul, South Korea
关键词
Malware detection; Opcode sequence; Deep learning; Convolutional neural networks; Recurrent neural networks; Autoencoder;
D O I
10.1016/j.ins.2020.05.026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a novel malware-detection model with a convolutional recurrent neural network using opcode sequences. Statistically, an executable file is considered as a set of consecutive machine codes. First, the theoretical foundation on which opcode sequences can be used to detect malware has been discussed. Next, an algorithm for extracting opcode sequences from executables and a deep learning-based malware-detection method that uses the opcode sequences as input have been presented. The proposed model comprises an opcode-level convolutional autoencoder that transforms a long opcode sequence to a relatively short compressed sequence at the front end and a dynamic recurrent neural network classifier that performs a prediction task using the codes generated by the opcodelevel convolutional autoencoder at the rear end. Experimentally, the proposed model provided a malware-detection accuracy of 96%, receiver operating characteristic-area under the curve of 0.99, and true positive rate (TPR) of 95%. The highest accuracy and TPR achieved by existing malware-detection methods using opcode sequences were 97% and 82%, respectively. Compared with this method, the proposed model delivered a slightly lower accuracy of 96% but a considerably larger TPR of 95%. Therefore, the proposed model is capable of more reliable malware detection. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 45 条
  • [1] Amodei D, 2016, PR MACH LEARN RES, V48
  • [2] Opcodes as predictor for malware
    Bilar, Daniel
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (02) : 156 - 168
  • [3] Machine learning based mobile malware detection using highly imbalanced network traffic
    Chen, Zhenxiang
    Yan, Qiben
    Han, Hongbo
    Wang, Shanshan
    Peng, Lizhi
    Wang, Lin
    Yang, Bo
    [J]. INFORMATION SCIENCES, 2018, 433 : 346 - 364
  • [4] Chung J., 2016, P 54 ANN M ASS COMP, DOI [10.18653/v1/P16-1160, DOI 10.18653/V1/P16-1160]
  • [5] Ding Y., 2016, P INT JT C NEUR NETW, DOI [10.1109/IJCNN.2016.7727705, DOI 10.1109/IJCNN.2016.7727705]
  • [6] Control flow-based opcode behavior analysis for Malware detection
    Ding, Yuxin
    Dai, Wei
    Yan, Shengli
    Zhang, Yumei
    [J]. COMPUTERS & SECURITY, 2014, 44 : 65 - 74
  • [7] Firat O, 2016, P 2016 C N AM CHAPT, P866, DOI 10.18653/v1/n16-1101
  • [8] Dynamic VSA: a framework for malware detection based on register contents
    Ghiasi, Mahboobe
    Sami, Ashkan
    Salehi, Zahra
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2015, 44 : 111 - 122
  • [9] DART: Directed automated random testing
    Godefroid, P
    Klarlund, N
    Sen, K
    [J]. ACM SIGPLAN NOTICES, 2005, 40 (06) : 213 - 223
  • [10] SAGE: Whitebox Fuzzing for Security Testing
    Godefroid, Patrice
    Levin, Michael Y.
    Molinar, David
    [J]. COMMUNICATIONS OF THE ACM, 2012, 55 (03) : 40 - 44