Random CapsNet for est model for imbalanced malware type classification task

被引:29
作者
Cayir, Aykut [1 ]
Unal, Ugur [1 ]
Dag, Hasan [1 ]
机构
[1] TC Kadir Has Univ, Dept Management Informat Syst, Istanbul, Turkey
关键词
Capsule networks; Malware; Ensemble model; Deep leaming; Machine leaming; NETWORKS;
D O I
10.1016/j.cose.2020.102133
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Behavior of malware varies depending the malware types, which affects the strategies of the system protection software. Many malware classification models, empowered by machine and/or deep leaming, achieve superior accuracies for predicting malware types. Machine leaming-based models need to do heavy feature engineering work, which affects the performance of the models greatly. On the other hand, deep leaming-based models require less effort in feature engineering when compared to that of the machine leaming-based models. However, traditional deep leaming architectures components, such as max and average pooling, cause architecture to be more complex and the models to be more sensitive to data. The capsule network architectures, on the other hand, reduce the aforementioned complexities by eliminating the pooling components. Additionally, capsule network architectures based models are less sensitive to data, unlike the classical convolutional neural network architectures. This paper proposes an ensemble capsule network model based on the bootstrap aggregating technique. The proposed method is tested on two widely used, highly imbalanced datasets (Malimg and BIG2015), for which the-state-of-the-art results are well-known and can be used for comparison purposes. The proposed model achieves the highest F-Score, which is 0.9820, for the BIG2015 dataset and F-Score, which is 0.9661, for the Malimg dataset. Our model also reaches the-state-of-the-art, using 99.7% lower the number of trainable parameters than the best model in the literature. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 61 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]  
Abijah Roseline S, 2019, COUNTERING CYBER ATT, P211
[3]  
Afshar P, 2018, IEEE IMAGE PROC, P3129, DOI 10.1109/ICIP.2018.8451379
[4]  
Alazab M., 2019, DEEP LEARNING APPL C
[5]   Profiling and classifying the behavior of malicious codes [J].
Alazab, Mamoun .
JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 100 :91-102
[6]  
Alazab M, 2013, ADV INF SECUR PRIV, P293, DOI 10.4018/978-1-4666-2083-4.ch011
[7]  
Azab A, 2016, IEEE TRUST BIG, P1788, DOI [10.1109/TrustCom.2016.0275, 10.1109/TrustCom.2016.273]
[8]   Mining Malware To Detect Variants [J].
Azab, Ahmad ;
Layton, Robert ;
Alazab, Mamoun ;
Oliver, Jonathan .
2014 5TH CYBERCRIME AND TRUSTWORTHY COMPUTING CONFERENCE CTC, 2014, :44-53
[9]   Fast authentication in wireless sensor networks [J].
Benzaid, Chafika ;
Lounis, Karim ;
Al-Nemrat, Ameer ;
Badache, Nadjib ;
Alazab, Mamoun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :362-375
[10]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32