Neural malware analysis with attention mechanism

被引:29
作者
Yakura, Hiromu [1 ,4 ]
Shinozaki, Shinnosuke [1 ]
Nishimura, Reon [1 ]
Oyama, Yoshihiro [2 ]
Sakuma, Jun [3 ,4 ,5 ]
机构
[1] Univ Tsukuba, Coll Informat Sci, Informat Engn, Tsukuba, Ibaraki, Japan
[2] Univ Tsukuba, Tsukuba, Ibaraki, Japan
[3] Univ Tsukuba, Sch Syst & Informat Engn, Dept Comp Sci, Tsukuba, Ibaraki, Japan
[4] RIKEN, Ctr Adv Intelligence Project, Tokyo, Japan
[5] JST CREST, Tokyo, Japan
关键词
Malware analysis; Convolutional neural network; Attention mechanism; Static analysis; Machine learning;
D O I
10.1016/j.cose.2019.101592
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Objectives: In order to confront diverse types of malware that evolve from moment to moment, it is important to instantly acquire deep knowledge related to the characteristics of malware samples. This paper proposes a method by which to extract important byte sequences of a given malware sample that characterize the functionality of the sample, which reduces the workload of human analysts who investigate the functionality of the sample. Design & methods: By applying a convolutional neural network (CNN) with an attention mechanism to an image converted from binary data, the proposed method enables calculation of an attention map, which is expected to specify regions having higher importance for classification. This distinction of regions enables the extraction of characteristic byte sequences peculiar to the malware family from the binary data and can provide useful information for human analysts without a priori knowledge. Results: The results of an evaluation experiment using a malware dataset reveal that the sequences extracted by the proposed method provide useful information for manual analysis. For example, in the case of BackdoorWin32.Agobot. It, the region with the highest importance in the attention map points at a function to receive commands from a remote server via IRC. This result characterizes the behavior of its family, Worm:Win32/Gaobot, which executes commands sent via IRC to construct a botnet. Conclusions: By taking advantage of a CNN with the attention mechanism, the proposed method is shown to provide important regions in the binaries selectively for manual analysis of malware samples. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 67 条
[31]  
Gao DB, 2008, LECT NOTES COMPUT SC, V5308, P238
[32]  
GARCIA M Miguez., 2012, O Risco de Comer uma Sopa e Outros Casos de Direito Penal: Elementos da Parte Geral, I, V2, P1
[33]  
Goel S, 2006, ELECTRON J PROBAB, V11
[34]  
Hardy W., 2016, P INT C DAT MIN STEE, P61
[35]  
Huang F, 2016, ACTA POLYM SIN, P399
[36]   Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2015, :1026-1034
[37]  
Kalash M, 2018, INT CONF NEW TECHNOL
[38]   Determining malicious executable distinguishing attributes and low-complexity detection [J].
Khan, Hassan ;
Mirza, Fauzan ;
Khayam, Syed Ali .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (02) :95-105
[39]  
Kingma D. P., 2015, P INT C LEARN REPR, P1
[40]  
Kirat Dhilung, 2013, P ANN COMP SEC APPL, P89