Explaining AI for Malware Detection: Analysis of Mechanisms of MalConv

被引:13
作者
Bose, Shamik [1 ]
Barao, Timothy [1 ]
Liu, Xiuwen [1 ]
机构
[1] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
来源
2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) | 2020年
关键词
Cybersecurity; Malware Detection; Explainable AI; Machine Learning; Neural Network; SYMBOLIC EXECUTION;
D O I
10.1109/ijcnn48605.2020.9207322
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, machine learning has been used in a very wide variety of applications and malware detection is no exception. Because of its fast and widespread adaptation to various diverse fields, machine learning can, and often is, treated as a black box. The disadvantage of doing so is that the decisions can often be difficult to interpret which can be especially challenging in the field of malware detection. Training deep neural networks also requires a vast amount of data from all classes which can be quite challenging in the field of proprietary software, specially for smaller research labs. In this paper, we introduce a framework which interpolates between samples of different classes at different layers to see how a deep network architecture generalizes to samples that are not in the training set, explaining the results of deep networks in real-world testing. Using this framework, we attempt to demystify the mechanisms behind the MalConv architecture [1] by analyzing the weights and gradients of multiple layers in its architecture and decipher what the architecture learns by analyzing raw bytes from the binary. For this architecture, our analysis shows that the network assigns much higher weights to specific portions of the executable Indicating that these portions contribute significantly more to the classification than other portions of the executable. Through the proposed framework, we can explain the mechanisms behind machine learning algorithms and explain their decisions better. In addition, the analyses will allow us to look inside existing networks without training them from scratch.
引用
收藏
页数:8
相关论文
共 50 条
[31]   A Comparative Study of Malware Detection in Enterprise Networks [J].
Chikkoppa, Balachandra ;
Hanumanthappa, J. ;
Patil, Vijeeta ;
Allagi, Shridhar ;
Rodriguez-Baca, Liset S. ;
Cruzado, Carlos F. .
2024 2ND WORLD CONFERENCE ON COMMUNICATION & COMPUTING, WCONF 2024, 2024,
[32]   Deceiving AI-based malware detection through polymorphic attacks [J].
Catalano, C. ;
Chezzi, A. ;
Angelelli, M. ;
Tommasi, F. .
COMPUTERS IN INDUSTRY, 2022, 143
[33]   AI-empowered malware detection system for industrial internet of things [J].
Smmarwar S.K. ;
Gupta G.P. ;
Kumar S. .
Computers and Electrical Engineering, 2023, 108
[34]   Semantic Set Analysis for Malware Detection [J].
Nguyen Van Nhuong ;
Vo Thi Yen Nhi ;
Nguyen Tan Cam ;
Mai Xuan Phu ;
Cao Dang Tan .
COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2014, 2014, 8838 :688-700
[35]   The sound of malware: an audio fingerprinting malware detection method [J].
Vasilellis, Efstratios ;
Katsiolis, Thanos ;
Gritzalis, Dimitris ;
Stergiopoulos, George ;
Sotiriou, Christina .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (03)
[36]   Metamorphic Malware Detection by PE Analysis with the Longest Common Sequence [J].
Thanh Nguyen Vu ;
Toan Tan Nguyen ;
Hieu Phan Trung ;
Thao Do Duy ;
Ke Hoang Van ;
Tuan Dinh Le .
FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 :262-272
[37]   Android malware detection through centrality analysis of applications network [J].
Mafakheri, Aso ;
Sulaimany, Sadegh .
APPLIED SOFT COMPUTING, 2024, 165
[38]   Position: The Explainability Paradox - Challenges for XAI in Malware Detection and Analysis [J].
Li, Rui ;
Gadyatskaya, Olga .
9TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW 2024, 2024, :554-561
[39]   ANASTASIA: ANdroid mAlware detection using STAtic analySIs of Applications [J].
Fereidooni, Hossein ;
Conti, Mauro ;
Yao, Danfeng ;
Sperduti, Alessandro .
2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
[40]   Android traffic malware analysis and detection using ensemble classifier [J].
Mohanraj, A. ;
Sivasankari, K. .
AIN SHAMS ENGINEERING JOURNAL, 2024, 15 (12)