An investigation of a deep learning based malware detection system

被引:13
作者
Sewak, Mohit [1 ]
Sahay, Sanjay K. [1 ]
Rathore, Hemant [1 ]
机构
[1] BITS, Dept CS & IS, Goa Campus NH-17B,By Pass Rd, Zuarinagar 403726, Goa, India
来源
13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018) | 2019年
关键词
Malware; Deep Learning; Machine Learning; Auto Encoders; Deep Neural Networks; Malicia; Cyber Security; FEATURE-SELECTION;
D O I
10.1145/3230833.3230835
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We investigate a Deep Learning based system for malware detection. In the investigation, we experiment with different combination of Deep Learning architectures including Auto-Encoders, and Deep Neural Networks with varying layers over Malicia malware dataset on which earlier studies have obtained an accuracy of (98%) with an acceptable False Positive Rates (1.07%). But these results were done using extensive man-made custom domain features and investing corresponding feature engineering and design efforts. In our proposed approach, besides improving the previous best results (99.21% accuracy and an False Positive Rate of 0.19%) indicates that Deep Learning based systems could deliver an effective defense against malware. Since it is good in automatically extracting higher conceptual features from the data, Deep Learning based systems could provide an effective, general and scalable mechanism for detection of existing and unknown malware.
引用
收藏
页数:5
相关论文
共 22 条
[1]   Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [J].
Ahmadi, Mansour ;
Ulyanov, Dmitry ;
Semenov, Stanislav ;
Trofimov, Mikhail ;
Giacinto, Giorgio .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :183-194
[2]  
[Anonymous], AC SPEECH SIGN PROC
[3]  
[Anonymous], 2008, J SYST CYBERN INFORM
[4]   Profile hidden Markov models and metamorphic virus detection [J].
Attaluri, Srilatha ;
McGhee, Scott ;
Stamp, Mark .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2009, 5 (02) :151-169
[5]   Opcodes as predictor for malware [J].
Bilar, Daniel .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (02) :156-168
[6]  
Henchiri O, 2006, IEEE DATA MINING, P891
[7]  
Karim ME, 2005, J COMPUT VIROL HACKI, V1, P13, DOI 10.1007/s11416-005-0002-9
[8]  
Kolosnjaji Bojan, 2016, AI 2016: Advances in Artificial Intelligence. 29th Australasian Joint Conference. Proceedings: LNAI 9992, P137, DOI 10.1007/978-3-319-50127-7_11
[9]  
Kolter Jeremy Z, 2004, KDD 2004, P470
[10]  
Lin CT, 2015, J INF SCI ENG, V31, P965