Malicious Code Detection based on Image Processing Using Deep Learning

被引:38
作者
Kumar, Rajesh [1 ]
Zhang Xiaosong [1 ]
Khan, Riaz Ullah [1 ]
Ahad, Ijaz [1 ]
Kumar, Jay [2 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Sichuan, Peoples R China
[2] Quaid e Azam Univ Islamabad, Islamabad, Pakistan
来源
PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE (ICCAI 2018) | 2018年
关键词
Malware Detection; Convolutional Neural Network; Mal- ware Classification; Deep Learning;
D O I
10.1145/3194452.3194459
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this study, we have used the Image Similarity technique to detect the unknown or new type of malware using CNN approach. CNN was investigated and tested with three types of datasets i.e. one from Vision Research Lab, which contains 9458 gray-scale images that have been extracted from the same number of malware samples that come from 25 different malware families, and second was benign dataset which contained 3000 different kinds of benign software. Benign dataset and dataset vision research lab were initially executable files which were converted in to binary code and then converted in to image files. We obtained a testing accuracy of 98% on Vision Research dataset.
引用
收藏
页码:81 / 85
页数:5
相关论文
共 10 条
[1]  
Abadi M., 2015, PREPRINT
[2]  
Alme C., 2012, U. S. Patent, Patent No. 8312546
[3]  
[Anonymous], 2015, DEEP NEURAL NETWORKS
[4]  
[Anonymous], J INFORM ASSURANCE S
[5]   An Overview of the State-of-the-Art of Cloud Computing Cyber-Security [J].
Bennasar, H. ;
Bendahmane, A. ;
Essaaidi, M. .
CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 :56-67
[6]   Look and Think Twice: Capturing Top-Down Visual Attention with Feedback Convolutional Neural Networks [J].
Cao, Chunshui ;
Liu, Xianming ;
Yang, Yi ;
Yu, Yinan ;
Wang, Jiang ;
Wang, Zilei ;
Huang, Yongzhen ;
Wang, Liang ;
Huang, Chang ;
Xu, Wei ;
Ramanan, Deva ;
Huang, Thomas S. .
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2015, :2956-2964
[7]  
Gavrilut Dragos, 2009, Proceedings of the 2009 International Multiconference on Computer Science and Information Technology (IMCSIT), P735, DOI 10.1109/IMCSIT.2009.5352759
[8]  
Nataraj L, 2011, P 4 ACM WORKSH SEC A, P21, DOI [10.1145/2046684.2046689, DOI 10.1145/2046684.2046689]
[9]   Practical Black-Box Attacks against Machine Learning [J].
Papernot, Nicolas ;
McDaniel, Patrick ;
Goodfellow, Ian ;
Jha, Somesh ;
Celik, Z. Berkay ;
Swami, Ananthram .
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, :506-519
[10]  
Shlens J., 2014, PROC INT C LEARNING