The rise of machine learning for detection and classification of malware: Research developments, trends and challenges

被引:268
作者
Gibert, Daniel [1 ]
Mateu, Carles [1 ]
Planes, Jordi [1 ]
机构
[1] Univ Lleida, Jaume II,69, Lleida, Spain
关键词
Malware detection; Feature engineering; Machine learning; Deep teaming; Multimodal learning; STRUCTURAL ENTROPY; ROBUST FEATURES; PATTERNS;
D O I
10.1016/j.jnca.2019.102526
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The struggle between security analysts and malware developers is a never-ending battle with the complexity of malware changing as quickly as innovation grows. Current state-of-the-art research focus on the development and application of machine learning techniques for malware detection due to its ability to keep pace with malware evolution. This survey aims at providing a systematic and detailed overview of machine learning techniques for malware detection and in particular, deep learning techniques. The main contributions of the paper are: (1) it provides a complete description of the methods and features in a traditional machine learning workflow for malware detection and classification, (2) it explores the challenges and limitations of traditional machine learning and (3) it analyzes recent trends and developments in the field with special emphasis on deep learning approaches. Furthermore, (4) it presents the research issues and unsolved challenges of the state-of-the-art techniques and (5) it discusses the new directions of research. The survey helps researchers to have an understanding of the malware detection field and of the new developments and directions of research explored by the scientific community to tackle the problem.
引用
收藏
页数:22
相关论文
共 109 条
  • [1] The rise of "malware": Bibliometric analysis of malware study
    Ab Razak, Mohd Faizal
    Anuar, Nor Badrul
    Salleh, Rosli
    Firdaus, Ahmad
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 58 - 76
  • [2] Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification
    Ahmadi, Mansour
    Ulyanov, Dmitry
    Semenov, Stanislav
    Trofimov, Mikhail
    Giacinto, Giorgio
    [J]. CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 183 - 194
  • [3] Identification of malicious activities in industrial internet of things based on deep learning models
    AL-Hawawreh, Muna
    Moustafa, Nour
    Sitnikova, Elena
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 1 - 11
  • [4] Graph-based malware detection using dynamic analysis
    Anderson, Blake
    Quist, Daniel
    Neil, Joshua
    Storlie, Curtis
    Lane, Terran
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04): : 247 - 258
  • [5] [Anonymous], 2013, 22 INT WORLD WID WEB
  • [6] [Anonymous], 2018, P ICLR 2018 WORKSHOP
  • [7] [Anonymous], MALWARE DETECTION AP
  • [8] [Anonymous], 2010, Proceedings of the 2010 ACM Symposium on Applied Computing
  • [9] [Anonymous], HUMAN CAPITAL CRISIS
  • [10] [Anonymous], J COMPUTER VIROLOGY