A Malware Detection Approach Using Malware Images and Autoencoders

被引:19
作者
Jin, Xiang [1 ]
Xing, Xiaofei [1 ]
Elahi, Haroon [1 ]
Wang, Guojun [1 ]
Jiang, Hai [2 ]
机构
[1] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 510006, Peoples R China
[2] Arkansas State Univ, Dept Comp Sci, State Univ, AR 72467 USA
来源
2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020) | 2020年
基金
中国国家自然科学基金;
关键词
Malware detection; Autoencoders; Malware images;
D O I
10.1109/MASS50613.2020.00009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most machine learning-based malware detection systems use various supervised learning methods to classify different instances of software as benign or malicious. This approach provides no information regarding the behavioral characteristics of malware. It also requires a large amount of training data and is prone to labeling difficulties and can reduce accuracy due to redundant training data. Therefore, we propose a malware detection method based on deep learning, which uses malware images and a set of autoencoders to detect malware. The method is to design an autoencoder to learn the functional characteristics of malware, and then to observe the reconstruction error of autoencoder to realize the classification and detection of malware and benign software. The proposed approach achieves 93% accuracy and comparatively better F1-score values while detecting malware and needs little training data when compared with traditional malware detection systems.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 24 条
[1]  
Ahmadi M, 2018, ABS180210135 CORR
[2]  
[Anonymous], KERAS BLOG
[3]  
Athiwaratkun B, 2017, INT CONF ACOUST SPEE, P2482, DOI 10.1109/ICASSP.2017.7952603
[4]  
Borghesi A, 2019, AAAI CONF ARTIF INTE, P9428
[5]   Malware detection in mobile environments based on Autoencoders and API-images [J].
D'Angelo, Gianni ;
Ficco, Massimo ;
Palmieri, Francesco .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 :26-33
[6]   Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis [J].
Fan, Ming ;
Liu, Jun ;
Luo, Xiapu ;
Chen, Kai ;
Tian, Zhenzhou ;
Zheng, Qinghua ;
Liu, Ting .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (08) :1890-1905
[7]  
Fereidooni H, 2016, 2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS)
[8]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[9]   Malware Detection with Malware Images using Deep Learning Techniques [J].
He, Ke ;
Kim, Dong Seong .
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, :95-102
[10]  
Hu W., 2018, WORKSH 32 AAAI C ART, P245