A few-shot malware classification approach for unknown family recognition using malware feature visualization

被引:23
作者
Conti, Mauro [1 ,2 ]
Khandhar, Shubham [2 ]
Vinod, P. [3 ]
机构
[1] Univ Padua, Dept Math, Padua, Italy
[2] Delft Univ Technol, Fac Elect Engn Math & Comp Sci, Delft, Netherlands
[3] Cochin Univ Sci & Technol, Dept Comp Applicat, Cochin, Kerala, India
关键词
Malware classification; Few-shot learning; Siamese neural networks; Deep neural networks; GEM Image; Malware visualization;
D O I
10.1016/j.cose.2022.102887
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever-increasing threat of malware attacks, building an effective malware classifier to detect mal-ware promptly is of utmost importance. Malware visualization approaches and deep learning techniques have proven effective in classifying sophisticated malware from benchmark datasets. A major problem with traditional deep learning classifier is the need to re-train the classifier when a new malware family emerges. In this paper, we propose few-shot classification techniques which allows us to classify mal-ware based on a few instances and without the need for re-training the classifier for novel malware fam-ilies. We also propose a novel malware visualization technique that can represent a malware binary as a 3-channel image. We experiment with two distinct few-shot learning architectures namely CSNN (Con-volutional Siamese Neural Network) and Shallow-FS (Shallow Few-Shot). CSNN is more suitable when scarce data is available for training, otherwise Shallow-FS can be used to achieve better performance. Our architectures outperforms state of the art few-shot learning approaches and achieves high accuracy in traditional malware classification. Our experiments show our models' ability to classify recent and novel malware families from just a few instances with high accuracy.(c) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:16
相关论文
共 48 条
[1]   FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries [J].
Alrabaee, Saed ;
Shirani, Paria ;
Wang, Lingyu ;
Debbabi, Mourad .
ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2018, 21 (02)
[2]  
[Anonymous], 2011, P 8 INT S VIS CYB SE, DOI 10.1145/2016904.2016908
[3]  
[Anonymous], 2010, MICROSOFT THREAT REP
[4]  
[Anonymous], 2009, MICROSOFT THREAT REP
[5]  
AV Test malware statistics, 2021, AV TEST MALW STAT
[6]  
Ayyar M., 2021, J ELECTRON IMAGING
[7]   Unsuccessful Story about Few Shot Malware Family Classification and Siamese Network to the Rescue [J].
Bai, Yude ;
Xing, Zhenchang ;
Li, Xiaohong ;
Feng, Zhiyong ;
Ma, Duoyuan .
2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), 2020, :1560-1571
[8]  
Bromley J., 1993, International Journal of Pattern Recognition and Artificial Intelligence, V7, P669, DOI 10.1142/S0218001493000339
[9]  
Burguera I., 2011, P 1 ACM WORKSH SEC P, P15, DOI DOI 10.1145/2046614.2046619
[10]  
Chen WY, 2020, Arxiv, DOI arXiv:1904.04232