Deep Learning versus Gist Descriptors for Image-based Malware Classification

被引:51
作者
Yajamanam, Sravani [1 ]
Selvin, Vikash Raja Samuel [1 ]
Di Troia, Fabio [1 ]
Stamp, Mark [1 ]
机构
[1] San Jose State Univ, Dept Comp Sci, San Jose, CA 95192 USA
来源
ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY | 2018年
关键词
Malware Detection; Gist Descriptors; Support Vector Machine; k-nearest Neighbor; Deep Learning; TensorFlow;
D O I
10.5220/0006685805530561
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image features known as "gist descriptors" have recently been applied to the malware classification problem. In this research, we implement, test, and analyze a malware score based on gist descriptors, and verify that the resulting score yields very strong classification results. We also analyze the robustness of this gist-based scoring technique when applied to obfuscated malware, and we perform feature reduction to determine a minimal set of gist features. Then we compare the effectiveness of a deep learning technique to this gist-based approach. While scoring based on gist descriptors is effective, we show that our deep learning technique performs equally well. A potential advantage of the deep learning approach is that there is no need to extract the gist features when training or scoring.
引用
收藏
页码:553 / 561
页数:9
相关论文
共 18 条
[1]  
[Anonymous], 2015, P NEUR INF PROC SYST
[2]  
[Anonymous], 2009, P ACM INT C IM VID R
[3]  
Bayer U, 2006, J COMPUT VIROL HACKI, V2, P67, DOI 10.1007/s11416-006-0012-2
[4]  
Desai Priti, 2010, International Journal of Multimedia Intelligence and Security, V1, P402, DOI 10.1504/IJMIS.2010.039240
[5]  
Google Codelabs, 2017, TENS POETS TENS POETS
[6]   ImageNet Classification with Deep Convolutional Neural Networks [J].
Krizhevsky, Alex ;
Sutskever, Ilya ;
Hinton, Geoffrey E. .
COMMUNICATIONS OF THE ACM, 2017, 60 (06) :84-90
[7]   Hunting for undetectable metamorphic viruses [J].
Lin, Da ;
Stamp, Mark .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (03) :201-214
[8]   Limits of static analysis for malware detection [J].
Moser, Andreas ;
Kruegel, Christopher ;
Kirda, Engin .
TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, :421-430
[9]   The MALICIA dataset: identification and analysis of drive-by download operations [J].
Nappa, Antonio ;
Rafique, M. Zubair ;
Caballero, Juan .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (01) :15-33
[10]  
Nataraj L., 2011, P 8 INT S VIS CYB SE, P1, DOI DOI 10.1145/2016904.2016908