Fusing feature engineering and deep learning: A case study for malware classification

被引:46
作者
Gibert, Daniel [1 ]
Planes, Jordi [2 ]
Mateu, Carles [2 ]
Le, Quan [1 ]
机构
[1] Univ Coll Dublin, CeADAR, Belfield Off Pk, Dublin, Ireland
[2] Univ Lleida, Jaume 2,69, Lleida, Spain
关键词
Malware classification; Machine learning; Deep learning; Feature extraction; Feature fusion; ARCHITECTURE; ENTROPY;
D O I
10.1016/j.eswa.2022.117957
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Machine learning has become an appealing signature-less approach to detect and classify malware because of its ability to generalize to never-before-seen samples and to handle large volumes of data. While traditional feature-based approaches rely on the manual design of hand-crafted features based on experts' knowledge of the domain, deep learning approaches replace the manual feature engineering process by an underlying system, typically consisting of a neural network with multiple layers, that perform both feature learning and classification altogether. However, the combination of both approaches could substantially enhance detection systems. In this paper we present an hybrid approach to address the task of malware classification by fusing multiple types of features defined by experts and features learned through deep learning from raw data. In particular, our approach relies on deep learning to extract N-gram like features from the assembly language instructions and the bytes of malware, and texture patterns and shapelet-based features from malware's grayscale image representation and structural entropy, respectively. These deep features are later passed as input to a gradient boosting model that combines the deep features and the hand-crafted features using an early-fusion mechanism. The suitability of our approach has been evaluated on the Microsoft Malware Classification Challenge benchmark and results show that the proposed solution achieves state-of-the-art performance and outperforms gradient boosting and deep learning methods in the literature.
引用
收藏
页数:18
相关论文
共 70 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]   Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [J].
Ahmadi, Mansour ;
Ulyanov, Dmitry ;
Semenov, Stanislav ;
Trofimov, Mikhail ;
Giacinto, Giorgio .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :183-194
[3]  
Anderson H. S., 2018, CORR ABS180404637ARX
[4]  
[Anonymous], 2011, P 8 INT S VIS CYB SE, DOI 10.1145/2016904.2016908
[5]   Structural entropy and metamorphic malware [J].
Baysa, Donabelle ;
Low, Richard M. ;
Stamp, Mark .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (04) :179-192
[6]  
Bilar D., 2006, BLACKHAT
[7]  
BXNET, 2016, TOP MAL US AP
[8]   Random CapsNet for est model for imbalanced malware type classification task [J].
Cayir, Aykut ;
Unal, Ugur ;
Dag, Hasan .
COMPUTERS & SECURITY, 2021, 102
[9]  
Chen T., 2016, CORR ABS160302754 AR
[10]  
Davuluru VSP, 2019, PROC NAECON IEEE NAT, P273, DOI [10.1109/naecon46414.2019.9058025, 10.1109/NAECON46414.2019.9058025]