Deep Learning CNN Implementation on Packed Malware for Cloud Cross Domain Solution Filters

被引:1
作者
Aguilera, Leo [1 ]
Jacobson, Doug [2 ]
机构
[1] Iowa State Univ, Elect & Comp Engn, Arlington, VA USA
[2] Iowa State Univ, Elect & Comp Engn, Ames, IA USA
来源
2022 INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ITS APPLICATIONS (ICODSA) | 2022年
关键词
cross domain solutions; department of defense information sharing; deep learning; convolutional neural networks; packed malware; cybersecurity; CLASSIFICATION;
D O I
10.1109/ICoDSA55874.2022.9862936
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research focuses on Windows Portable Executable (PE) packed malware detection and Deep Learning (DL) using the Convolutional Neural Network (CNN) algorithm. Our primary goal is to improve the usage of DL techniques in Cybersecurity to strengthen the defenses against cyberattacks on U. S. Department of Defense (DoD) systems. According to our hypothesis, existing Cross Domain Solutions (CDSs) can be upgraded to include built-in DL-CNN algorithms for identifying well-crafted packed malware. To put this into perspective, implementing DL-CNN into the Cross Domain Solution (CDS) filter software will significantly enhance the effectiveness and detection of packed malware. CDSs are strategically positioned between unclassified and classified systems, and with DL-CNN capabilities, the CDS virus detection filter will learn to detect malware on its own, regardless of whether the malware is well-crafted, packed, or encrypted. Using our trained model, we were able to identify Windows packed PE malicious executables from Windows packed PE benign executables with an average training accuracy of 94 percent and a validation accuracy of 93 percent. Although the DL-CNN algorithm's results could be enhanced through further development and refinement using KerasTuner, this research provides a solid foundation. Our experiments were conducted on our lab computer system and in the Amazon SageMaker Studio Lab and Google Collab cloud environments.
引用
收藏
页码:192 / 197
页数:6
相关论文
共 28 条
[1]  
33 Technologies LLC., IT CONS CYB CLOUD BA
[2]  
Aguilera L., packed-malware-research
[3]  
Aguilera L., 2021 4 ARTIFICIAL IN, P165, DOI [10.1145/3508259.3508283, DOI 10.1145/3508259.3508283]
[4]  
[Anonymous], 2013, 2013 INT JOINT C NEU, DOI DOI 10.1109/IJCNN.2013.6707043
[5]  
[Anonymous], 2019, EXECORDERNO1385984FE
[6]  
Bergenhotlz E., Information and Communications Security, ICIS 2020, V12282, DOI DOI 10.1007/978-3-030-61078-4_3
[7]  
Burgess C, 2014, 2014 5TH EUROPEAN WORKSHOP ON VISUAL INFORMATION PROCESSING (EUVIP 2014)
[8]   Xception: Deep Learning with Depthwise Separable Convolutions [J].
Chollet, Francois .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :1800-1807
[9]   Detection of Malicious Code Variants Based on Deep Learning [J].
Cui, Zhihua ;
Xue, Fei ;
Cai, Xingjuan ;
Cao, Yang ;
Wang, Gai-ge ;
Chen, Jinjun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (07) :3187-3196
[10]   Ensemble-Based Classification Using Neural Networks and Machine Learning Models for Windows PE Malware Detection [J].
Damasevicius, Robertas ;
Venckauskas, Algimantas ;
Toldinas, Jevgenijus ;
Grigaliunas, Sarunas .
ELECTRONICS, 2021, 10 (04) :1-23