Deep Learning CNN Implementation on Packed Malware for Cloud Cross Domain Solution Filters

被引:1
作者
Aguilera, Leo [1 ]
Jacobson, Doug [2 ]
机构
[1] Iowa State Univ, Elect & Comp Engn, Arlington, VA USA
[2] Iowa State Univ, Elect & Comp Engn, Ames, IA USA
来源
2022 INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ITS APPLICATIONS (ICODSA) | 2022年
关键词
cross domain solutions; department of defense information sharing; deep learning; convolutional neural networks; packed malware; cybersecurity; CLASSIFICATION;
D O I
10.1109/ICoDSA55874.2022.9862936
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research focuses on Windows Portable Executable (PE) packed malware detection and Deep Learning (DL) using the Convolutional Neural Network (CNN) algorithm. Our primary goal is to improve the usage of DL techniques in Cybersecurity to strengthen the defenses against cyberattacks on U. S. Department of Defense (DoD) systems. According to our hypothesis, existing Cross Domain Solutions (CDSs) can be upgraded to include built-in DL-CNN algorithms for identifying well-crafted packed malware. To put this into perspective, implementing DL-CNN into the Cross Domain Solution (CDS) filter software will significantly enhance the effectiveness and detection of packed malware. CDSs are strategically positioned between unclassified and classified systems, and with DL-CNN capabilities, the CDS virus detection filter will learn to detect malware on its own, regardless of whether the malware is well-crafted, packed, or encrypted. Using our trained model, we were able to identify Windows packed PE malicious executables from Windows packed PE benign executables with an average training accuracy of 94 percent and a validation accuracy of 93 percent. Although the DL-CNN algorithm's results could be enhanced through further development and refinement using KerasTuner, this research provides a solid foundation. Our experiments were conducted on our lab computer system and in the Amazon SageMaker Studio Lab and Google Collab cloud environments.
引用
收藏
页码:192 / 197
页数:6
相关论文
共 28 条
[11]  
Damoose R., Proceedings of the 2020 International Conference on Management of e-Commerce and e-Government (ICMECG 2020), P94, DOI DOI 10.1145/3409891.3409912
[12]   Detecting Android Malware Using Bytecode Image [J].
Ding, Yuxin ;
Wu, Rui ;
Xue, Fuxing .
COGNITIVE COMPUTING (ICCC 2018), 2018, 10971 :164-169
[13]  
Gibert D., 2018, Proceedings of the AAAI Conference on Artificial Intelligence, V32, DOI DOI 10.1609/AAAI.V32I1.11409
[14]  
Guo FL, 2008, LECT NOTES COMPUT SC, V5230, P98
[15]   Malware Detection with Malware Images using Deep Learning Techniques [J].
He, Ke ;
Kim, Dong Seong .
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, :95-102
[16]   Machine Learning and the Platformization of the Military: A Study of Google's Machine Learning Platform TensorFlow [J].
Hoijtink, Marijn ;
Planque-van Hardeveld, Anneroos .
INTERNATIONAL POLITICAL SOCIOLOGY, 2022, 16 (02)
[17]  
Kalash M, 2018, INT CONF NEW TECHNOL
[18]  
Kebede TM, 2017, PROC NAECON IEEE NAT, P70, DOI 10.1109/NAECON.2017.8268747
[19]   Malicious Code Detection based on Image Processing Using Deep Learning [J].
Kumar, Rajesh ;
Zhang Xiaosong ;
Khan, Riaz Ullah ;
Ahad, Ijaz ;
Kumar, Jay .
PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE (ICCAI 2018), 2018, :81-85
[20]  
Schofield M., 2021, 8th International Conference on Artificial Intelligence and Applications (AIAP), P85, DOI DOI 10.5121/CSIT.2021.110106