Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security

被引:19
作者
Qiao, Yanchen [1 ]
Zhang, Weizhe [1 ,2 ]
Du, Xiaojiang [3 ]
Guizani, Mohsen [4 ]
机构
[1] Peng Cheng Lab, Cyberspace Secur Res Ctr, 2 Xingke 1st St, Shenzhen 518000, Peoples R China
[2] Harbin Inst Technol, Sch Comp Sci & Technol, 92 Xidazhi St, Harbin 150001, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, 1801 N Broad St, Philadelphia, PA 19122 USA
[4] Qatar Univ, Dept Comp Sci & Engn, Univ St, Doha, Qatar
关键词
Malware classification; Word2Vec; multilayer perception; IoT; PRIVACY;
D O I
10.1145/3436751
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the security of IoT devices. The traditional malware classificationmethods mainly rely on feature engineering. To improve accuracy, a large number of different types of features will be extracted from malware files in these methods. That brings a high complexity to the classification. To solve these issues, a malware classification method based on Word2Vec and Multilayer Perception (MLP) is proposed in this article. First, for one malware sample, Word2Vec is used to calculate aword vector for all bytes of the binary file and all instructions in the assembly file. Second, we combine these vectors into a 256x256x2-dimensional matrix. Finally, we designed a deep learning network structure based on MLP to train the model. Then the model is used to classify the testing samples. The experimental results prove that the method has a high accuracy of 99.54%.
引用
收藏
页数:22
相关论文
共 44 条
[1]  
[Anonymous], 2002, PROC ACM S THEORY CO
[2]  
AV-TEST Institute, 2020, MALW STAT TRENDS REP
[3]   Malware Classification Using Deep Learning Methods [J].
Cakir, Bugra ;
Dogdu, Erdogan .
ACMSE '18: PROCEEDINGS OF THE ACMSE 2018 CONFERENCE, 2018,
[4]   Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection [J].
Chen, Xiao ;
Li, Chaoran ;
Wang, Derui ;
Wen, Sheng ;
Zhang, Jun ;
Nepal, Surya ;
Xiang, Yang ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :987-1001
[5]  
Chen Xu, 2008, P 2008 IEEE INT C DE
[6]  
Dahl GE, 2013, INT CONF ACOUST SPEE, P3422, DOI 10.1109/ICASSP.2013.6638293
[7]   Malware detection based on deep learning algorithm [J].
Ding Yuxin ;
Zhu Siyi .
NEURAL COMPUTING & APPLICATIONS, 2019, 31 (02) :461-472
[8]   Greedy function approximation: A gradient boosting machine [J].
Friedman, JH .
ANNALS OF STATISTICS, 2001, 29 (05) :1189-1232
[9]  
Gao J, 2017, INT CONF SOFTW ENG, P33, DOI 10.1109/ICSESS.2017.8342858
[10]  
Giannella C, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P7, DOI 10.1109/ISI.2015.7165931