A Vision Transformer Enhanced with Patch Encoding for Malware Classification

被引:3
作者
Park, Kyoung-Won [1 ]
Cho, Sung-Bae [1 ,2 ]
机构
[1] Yonsei Univ, Dept Artificial Intelligence, Seoul 03722, South Korea
[2] Yonsei Univ, Dept Comp Sci, Seoul 03722, South Korea
来源
INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2022 | 2022年 / 13756卷
关键词
Malware detection; Vision transformer; Location/relation information;
D O I
10.1007/978-3-031-21753-1_29
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With various benefits through software technology development, malicious attacks to steal confidential and company information have constantly been increasing. Recent deep learning models with images converted from malicious code achieve meaningful results, but they have challenges in classifying the same malware family, like Ramnit, Tracur, and Obfuscator. ACY that have similar structures in the image. Instead of observing the overall global features, there is a need for a method of considering the position of local features and learning the relationships between them. In this paper, we propose a vision transformer enhanced with the additional encoding of multiple patches for location information of local features and relationship information between them. For learning considering position information and all relationships between patches, [CLS] tokens that can summarize all information are utilized. 10-fold cross-validation with the Microsoft challenge dataset shows that the proposed model produces better accuracy than comparable studies. The misclassification analysis confirms that the proposed method can detect the same malware family penetrated by the conventional deep learning model. Additional analysis with the activation map emphasizes which structural and sequential features are extracted to detect different codes belonging to the same malware family.
引用
收藏
页码:289 / 299
页数:11
相关论文
共 38 条
[1]   MSIC: Malware Spectrogram Image Classification [J].
Azab, Ahmad ;
Khasawneh, Mahmoud .
IEEE ACCESS, 2020, 8 :102007-102021
[2]   Transfer Learning for Image-based Malware Classification [J].
Bhodia, Niket ;
Prajapati, Pratikkumar ;
Di Troia, Fabio ;
Stamp, Mark .
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, :719-726
[3]  
Burks R III, 2019, 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P660, DOI [10.1109/uemcon47517.2019.8993085, 10.1109/UEMCON47517.2019.8993085]
[4]   Data augmentation based malware detection using convolutional neural networks [J].
Catak, Ferhat Ozgur ;
Ahmed, Javed ;
Sahinbas, Kevser ;
Khand, Zahid Hussain .
PEERJ COMPUTER SCIENCE, 2021,
[5]  
Choi S, 2017, I C INF COMM TECH CO, P1193, DOI 10.1109/ICTC.2017.8190895
[6]  
Conti G, 2008, LECT NOTES COMPUT SC, V5210, P1, DOI 10.1007/978-3-540-85933-8_1
[7]   Malicious code detection based on CNNs and multi-objective algorithm [J].
Cui, Zhihua ;
Du, Lei ;
Wang, Penghong ;
Cai, Xingjuan ;
Zhang, Wensheng .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 129 :50-58
[8]   Detection of Malicious Code Variants Based on Deep Learning [J].
Cui, Zhihua ;
Xue, Fei ;
Cai, Xingjuan ;
Cao, Yang ;
Wang, Gai-ge ;
Chen, Jinjun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (07) :3187-3196
[9]  
Dosovitskiy A, 2021, ICLR
[10]  
Han K.S., 2013, Proceedings of the 2013 Research in Adaptive and Convergent Systems ACM, P317, DOI DOI 10.1145/2513228.2513294