Deep learning at the shallow end: Malware classification for non-domain experts

被引:122
作者
Le, Quan [1 ]
Boydell, Oisin [1 ]
Mac Namee, Brian [1 ]
Scanlon, Mark [2 ]
机构
[1] Univ Coll Dublin, Ctr Appl Data Analyt Res, Dublin, Ireland
[2] Univ Coll Dublin, Forens & Secur Res Grp, Dublin, Ireland
关键词
Deep learning; Machine learning; Malware analysis; Reverse engineering;
D O I
10.1016/j.diin.2018.04.024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current malware detection and classification approaches generally rely on time consuming and knowledge intensive processes to extract patterns (signatures) and behaviors from malware, which are then used for identification. Moreover, these signatures are often limited to local, contiguous sequences within the data whilst ignoring their context in relation to each other and throughout the malware file as a whole. We present a Deep Learning based malware classification approach that requires no expert domain knowledge and is based on a purely data driven approach for complex pattern and feature identification. (C) 2018 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.
引用
收藏
页码:S118 / S126
页数:9
相关论文
共 42 条
[1]   Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [J].
Ahmadi, Mansour ;
Ulyanov, Dmitry ;
Semenov, Stanislav ;
Trofimov, Mikhail ;
Giacinto, Giorgio .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :183-194
[2]  
[Anonymous], 2017, CoRR
[3]  
Bradski G, 2000, DR DOBBS J, V25, P120
[4]   Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language [J].
Casey, Eoghan ;
Barnum, Sean ;
Griffith, Ryan ;
Snyder, Jonathan ;
van Beek, Harm ;
Nelson, Alex .
DIGITAL INVESTIGATION, 2017, 22 :14-45
[5]  
Dahl GE, 2013, INT CONF ACOUST SPEE, P3422, DOI 10.1109/ICASSP.2013.6638293
[6]  
David O.E., 2015, 2015 INT JOINT C NEU, P1, DOI DOI 10.1109/IJCNN.2015.7280815
[7]  
Davis A., 2015, DEEP LEARNING DISASS
[8]  
de Braekt RI, 2016, 2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), P68, DOI 10.1109/ISDFS.2016.7473520
[9]  
Franke K, 2008, LECT NOTES COMPUT SC, V5158, P1
[10]  
Gandotra E., 2014, J. Inf. Secur., V5, P56, DOI DOI 10.4236/JIS.2014.52006