A Novel Malware Detection System Based On Machine Learning and Binary Visualization

被引:24
作者
Baptista, Irina [1 ]
Shiaeles, Stavros [1 ]
Kolokotronis, Nicholas [2 ]
机构
[1] Plymouth Univ, Ctr Secur Commun & Networks Res CSCAN, Plymouth PL4 8AA, Devon, England
[2] Univ Peloponnese, Dept Informat & Telecommun, Tripolis 22131, Greece
来源
2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS) | 2019年
关键词
Security; malicious software; machine learning; self-organizing neural networks; binary visualisation;
D O I
10.1109/iccw.2019.8757060
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The continued evolution and diversity of malware constitutes a major threat in modern systems. It is well proven that security defenses currently available are ineffective to mitigate the skills and imagination of cyber-criminals necessitating the development of novel solutions. Deep learning algorithms and artificial intelligence (AI) are rapidly evolving with remarkable results in many application areas. Following the advances of AI and recognizing the need for efficient malware detection methods, this paper presents a new approach for malware detection based on binary visualization and self-organizing incremental neural networks. The proposed method's performance in detecting malicious payloads in various file types was investigated and the experimental results showed that a detection accuracy of 91.7% and 94.1% was achieved for ransomware in .pdf and .doc files respectively. With respect to other formats of malicious code and other file types, including binaries, the proposed method behaved well with an incremental detection rate that allows efficiently detecting unknown malware at real-time.
引用
收藏
页数:6
相关论文
共 40 条
[1]  
Burgess C., 2014, EUVIP 14, P1
[2]  
Cortesi A., 2016, Tech. Rep.
[3]  
Dadkhah M., 2014, INT J INFORM TECHNOL, V3, P1
[4]  
Dahl GE, 2013, INT CONF ACOUST SPEE, P3422, DOI 10.1109/ICASSP.2013.6638293
[5]  
FALOUTSOS C, 1991, P 7 IEEE INT C DAT E, P152
[6]   Malware Detection Using Perceptrons and Support Vector Machines [J].
Gavrilut, Dragos ;
Cimpoesu, Mihai ;
Anton, Dan ;
Ciortuz, Liviu .
2009 COMPUTATION WORLD: FUTURE COMPUTING, SERVICE COMPUTATION, COGNITIVE, ADAPTIVE, CONTENT, PATTERNS, 2009, :283-288
[7]  
Gove R., 2014, Proc. VizSec, P72, DOI DOI 10.1145/2671491.2671496
[8]   WiP: Are cracked applications really free? An empirical analysis on Android devices [J].
Grammatikakis, Konstantinos-Panagiotis ;
Ioannou, Angela ;
Shiaeles, Stavros ;
Kolokotronis, Nicholas .
2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, :730-735
[9]   Viewpoint Invariant Pedestrian Recognition with an Ensemble of Localized Features [J].
Gray, Douglas ;
Tao, Hai .
COMPUTER VISION - ECCV 2008, PT I, PROCEEDINGS, 2008, 5302 :262-275
[10]  
Han B, 2014, SCI WORLD J, DOI [10.1155/2014/724804, 10.1155/2014/132713]