Malware visualization methods based on deep convolution neural networks

被引:21
|
作者
Ren, Zhuojun [1 ]
Chen, Guang [1 ]
Lu, Wenke [1 ]
机构
[1] Donghua Univ, Coll Informat Sci & Technol, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Malware visualization; Space filling curves; Convolution neural networks; Deep learning; Transfer learning;
D O I
10.1007/s11042-019-08310-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose two visualization methods for malware analysis based on n-gram features of byte sequences. The space filling curve mapping (SFCM) method uses fractal curves to visualize the one-gram features of byte sequences, i.e. malware files themselves, and distinguishes the printable characters from non-printable ones by different colors. This method addresses the issues that the existing methods cannot interactively locate characters and avoid the risk of the Decompression Bomb attack caused by large malware. The Markov dot plot (MDP) method visualizes the bi-gram features and their statistical information of byte sequences as the coordinates and brightness of the pixels and solves the problem that the relocation of code sections or the addition of redundant information helps malware escape the global image detection. The two methods are applied to the Microsoft malware samples (BIG 2015| Kaggle) and their visualized results are learned by the deep convolution networks to extract image features used for classification by SVM (support vector machine). In terms of malware classification, our methods obtained 98.36% and 99.08% classification accuracy, respectively. We also visualized the benign PE (portable executable) files in the Windows OS and verified them with the above malware set. In terms of malware detection, the two methods obtained 99.21% and 98.74% detection accuracy, respectively. These results are better than the existing grayscale method.
引用
收藏
页码:10975 / 10993
页数:19
相关论文
共 50 条
  • [1] Malware visualization methods based on deep convolution neural networks
    Zhuojun Ren
    Guang Chen
    Wenke Lu
    Multimedia Tools and Applications, 2020, 79 : 10975 - 10993
  • [2] Deep Convolution Neural Networks for Image-Based Android Malware Classification
    Ksibi, Amel
    Zakariah, Mohammed
    Almuqren, Latifah
    Alluhaidan, Ala Saleh
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (03): : 4093 - 4116
  • [3] Malware Visualization Based on Deep Learning
    Ren, Zhuojun
    Bai, Ting
    2021 14TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI 2021), 2021,
  • [4] Malware detection approach based on deep convolutional neural networks
    El Merabet, Hoda
    Hajraoui, Abderrahmane
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 20 (1-2) : 145 - 157
  • [5] Malware detection employed by visualization and deep neural network
    Pinhero, Anson
    Anupama, M. L.
    Vinod, P.
    Visaggio, C. A.
    Aneesh, N.
    Abhijith, S.
    AnanthaKrishnan, S.
    COMPUTERS & SECURITY, 2021, 105
  • [6] Safety helmet recognition based on deep convolution neural networks
    Zhou, Ningning
    Huang, Guofang
    Shi, Shaodong
    DATA SCIENCE AND KNOWLEDGE ENGINEERING FOR SENSING DECISION SUPPORT, 2018, 11 : 959 - 967
  • [7] Malware Classification with Deep Convolutional Neural Networks
    Kalash, Mahmoud
    Rochan, Mrigank
    Mohammed, Noman
    Bruce, Neil D. B.
    Wang, Yang
    Iqbal, Farkhund
    2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
  • [8] Detecting Malware Using Deep Neural Networks
    T. D. Ovasapyan
    M. A. Volkovskii
    A. S. Makarov
    Automatic Control and Computer Sciences, 2024, 58 (8) : 1147 - 1155
  • [9] Deep Neural Networks for Android Malware Detection
    Hota, Abhilash
    Irolla, Paul
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 657 - 663
  • [10] Obfuscation-resilient Android Malware Detection Based on Graph Convolution Neural Networks.
    Wu Y.-M.
    Qi M.
    Zou D.-Q.
    Jin H.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (06): : 2526 - 2542