Towards Optimizing Malware Detection: An Approach Based on Generative Adversarial Networks and Transformers

被引:7
作者
Alzahem, Ayyub [1 ]
Boulila, Wadii [2 ,4 ]
Driss, Maha [3 ,4 ]
Koubaa, Anis [2 ]
Almomani, Iman [3 ,5 ]
机构
[1] Taibah Univ, Deanship Informat Technol, Medina 42353, Saudi Arabia
[2] Prince Sultan Univ, Robot & Internet Things Lab, CCIS, Riyadh 12435, Saudi Arabia
[3] Prince Sultan Univ, Secur Engn Lab, CCIS, Riyadh 12435, Saudi Arabia
[4] Univ Manouba, RIADI Lab, Manouba 2010, Tunisia
[5] Univ Jordan, King Abdullah II Sch Informat Technol, CS Dept, Amman 11942, Jordan
来源
COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2022 | 2022年 / 13501卷
关键词
Malware analysis; Generative adversarial networks; Transformers; Data augmentation; Deep learning;
D O I
10.1007/978-3-031-16014-1_47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, cybercriminals are carrying out many forms of cyberattacks. Malware attacks, in particular, have emerged as one of the most challenging concerns in the cybersecurity area, as well as a key weapon used by cybercriminals. Malware is a term used to describe harmful software. Malware can be used to modify or destroy data on target computers, steal private information, control systems to attack other devices, host and disseminate illicit material, and disrupt vital infrastructures. As a result, many tools and approaches for detecting and mitigating malware attacks have been developed. Despite the improvement and rapid expansion of malware defense techniques, cybercriminals are able to develop more sophisticated and advanced malware that can defeat state-of-the-art security and anti-malware solutions. This paper proposes a novel approach based on generative adversarial networks and transformers to improve malware detection performance. By using generative adversarial transformers, the proposed approach aims to increase the malware data size and solve the data imbalance distribution issue. Promising experimental results showed an improved accuracy of malware detection of 3% using several pre-trained models when solving the problem of unbalanced data.
引用
收藏
页码:598 / 610
页数:13
相关论文
共 31 条
[1]   Misbehavior-Aware On-Demand Collaborative Intrusion Detection System Using Distributed Ensemble Learning for VANET [J].
A. Ghaleb, Fuad ;
Saeed, Faisal ;
Al-Sarem, Mohammad ;
Ali Saleh Al-rimy, Bander ;
Boulila, Wadii ;
Eljialy, A. E. M. ;
Aloufi, Khalid ;
Alazab, Mamoun .
ELECTRONICS, 2020, 9 (09) :1-17
[2]   A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices [J].
Almomani, Iman ;
Alkhayer, Aala ;
El-Shafai, Walid .
SENSORS, 2022, 22 (06)
[3]   Novel Ransomware Hiding Model Using HEVC Steganography Approach [J].
Almomani, Iman ;
AlKhayer, Aala ;
El-Shafai, Walid .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01) :1209-1228
[4]   DL-Droid: Deep learning based android malware detection using real devices [J].
Alzaylaee, Mohammed K. ;
Yerima, Suleiman Y. ;
Sezer, Sakir .
COMPUTERS & SECURITY, 2020, 89
[5]  
Arad Hudson D., 2021, Advances in Neural Information Processing Systems, V34
[6]   A Comprehensive Review on Malware Detection Approaches [J].
Aslan, Omer ;
Samet, Refik .
IEEE ACCESS, 2020, 8 :6249-6271
[7]  
Baig M., 2012, 2012 World Congress on Internet Security (WorldCIS-2012), P99
[8]   Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives [J].
Bello, Ibrahim ;
Chiroma, Haruna ;
Abdullahi, Usman A. ;
Gital, Abdulsalam Ya'u ;
Jauro, Fatsuma ;
Khan, Abdullah ;
Okesola, Julius O. ;
Abdulhamid, Shafi'i M. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (09) :8699-8717
[9]   A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks [J].
Ben Atitallah, Safa ;
Driss, Maha ;
Almomani, Iman .
SENSORS, 2022, 22 (11)
[10]   Randomly initialized convolutional neural network for the recognition of COVID-19 using X-ray images [J].
Ben Atitallah, Safa ;
Driss, Maha ;
Boulila, Wadii ;
Ben Ghezala, Henda .
INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2022, 32 (01) :55-73