Visualization Approach for Malware Classification with ResNeXt

被引:0
作者
Go, Jin Ho [1 ]
Jan, Tony [2 ]
Mohanty, Manoranjan [3 ]
Patel, Om Prakash [4 ]
Puthal, Deepak [5 ]
Prasad, Mukesh [1 ]
机构
[1] Univ Technol Sydney, FEIT, Sch Comp Sci, Ctr Artificial Intelligence, Sydney, NSW, Australia
[2] Melbourne Inst Technol, Sch Informat Technol & Engn, Melbourne, Vic, Australia
[3] Univ Technol Sydney, Fac Sci, Ctr Forens Sci, Sydney, NSW, Australia
[4] Mahindra Ecole Cent, Dept Comp Sci & Engn, Hyderabad, India
[5] Newcastle Univ, Sch Comp, Newcastle Upon Tyne, Tyne & Wear, England
来源
2020 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC) | 2020年
关键词
Malware; cybercrime; cyber threat; cybersecurity; intrusion detection system; convolutional neural network; visualization;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet has resulted in cyber-threats and cyber-crimes, which can occur anywhere at any time. Among various cyber threats, modern malware with applied metamorphosis and polymorphic technology is a concern as it can proliferate to advanced variants from its original shape. The typical malware analysis methods, including signature-based approach, remain vulnerable to such advanced variants. This paper proposes a visualization-based approach for malware analysis using the state-of-the-art Convolution Neural Network (CNN) model such as ResNeXt, which had achieved outstanding performance in image classifications with competitive computational complexity. The proposed method transforms the attributes of raw malware binary executable files to greyscale images for further analysis by well-established deep learning models. The greyscale images, which result of data transformation for visualization, are classified using ResNeXt. The experiment results show that the proposed solution achieves 98.32% and 98.86% of accuracy in malware classification on Malimg dataset and modified Malimg dataset, respectively. The proposed method outperforms other comparable methods in terms of classification accuracy and requires similar level of computational power.
引用
收藏
页数:7
相关论文
共 19 条
[1]  
[Anonymous], 2018, SPECIAL ISSUE ADV PE
[2]  
[Anonymous], 2007, BLACK HAT C US
[3]  
[Anonymous], 2016, RESNET RESNET GEN RE
[4]  
Brownlee J, 2019, A tour of machine learning algorithms
[5]   Automated mapping of large binary objects using primitive fragment type classification [J].
Conti, Gregory ;
Bratus, Sergey ;
Shubina, Anna ;
Sangster, Benjamin ;
Ragsdale, Roy ;
Supan, Matthew ;
Lichtenberg, Andrew ;
Perez-Alemany, Robert .
DIGITAL INVESTIGATION, 2010, 7 :S3-S12
[6]  
Godlewski M., 2018, MALWARE WARNING
[7]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[8]  
Helfman J., 1996, Theory and Practice of Object Systems, V2, P31, DOI 10.1002/(SICI)1096-9942(1996)2:1<31::AID-TAPO3>3.0.CO
[9]  
2-A
[10]  
Kadivar M, 2014, TECHNOL INNOV MANAG, P22