Explaining AI for Malware Detection: Analysis of Mechanisms of MalConv

被引:15
作者
Bose, Shamik [1 ]
Barao, Timothy [1 ]
Liu, Xiuwen [1 ]
机构
[1] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
来源
2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) | 2020年
关键词
Cybersecurity; Malware Detection; Explainable AI; Machine Learning; Neural Network; SYMBOLIC EXECUTION;
D O I
10.1109/ijcnn48605.2020.9207322
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, machine learning has been used in a very wide variety of applications and malware detection is no exception. Because of its fast and widespread adaptation to various diverse fields, machine learning can, and often is, treated as a black box. The disadvantage of doing so is that the decisions can often be difficult to interpret which can be especially challenging in the field of malware detection. Training deep neural networks also requires a vast amount of data from all classes which can be quite challenging in the field of proprietary software, specially for smaller research labs. In this paper, we introduce a framework which interpolates between samples of different classes at different layers to see how a deep network architecture generalizes to samples that are not in the training set, explaining the results of deep networks in real-world testing. Using this framework, we attempt to demystify the mechanisms behind the MalConv architecture [1] by analyzing the weights and gradients of multiple layers in its architecture and decipher what the architecture learns by analyzing raw bytes from the binary. For this architecture, our analysis shows that the network assigns much higher weights to specific portions of the executable Indicating that these portions contribute significantly more to the classification than other portions of the executable. Through the proposed framework, we can explain the mechanisms behind machine learning algorithms and explain their decisions better. In addition, the analyses will allow us to look inside existing networks without training them from scratch.
引用
收藏
页数:8
相关论文
共 50 条
[41]   Android traffic malware analysis and detection using ensemble classifier [J].
Mohanraj, A. ;
Sivasankari, K. .
AIN SHAMS ENGINEERING JOURNAL, 2024, 15 (12)
[42]   Application of Anomaly Detection Models to Malware Detection in the Presence of Concept Drift [J].
Escudero Garcia, David ;
DeCastro-Garcia, Noemi .
HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, HAIS 2023, 2023, 14001 :15-26
[43]   Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach [J].
Kumar, Rajesh ;
Subbiah, Geetha .
SENSORS, 2022, 22 (07)
[44]   Application of Transfer Learning to Online Models in Malware Detection [J].
Escudero Garcia, David ;
DeCastro-Garcia, Noemi .
HYBRID ARTIFICIAL INTELLIGENT SYSTEM, PT I, HAIS 2024, 2025, 14857 :177-189
[45]   Malware Detection with Directed Cyclic Graph and Weight Merging [J].
Li, Shanxi ;
Zhou, Qingguo ;
Wei, Wei .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (09) :3258-3273
[46]   Robust Intelligent Malware Detection Using Deep Learning [J].
Vinayakumar, R. ;
Alazab, Mamoun ;
Soman, K. P. ;
Poornachandran, Prabaharan ;
Venkatraman, Sitalakshmi .
IEEE ACCESS, 2019, 7 :46717-46738
[47]   A Survey of Android Malware Detection with Deep Neural Models [J].
Qiu, Junyang ;
Zhang, Jun ;
Luo, Wei ;
Pan, Lei ;
Nepal, Surya ;
Xiang, Yang .
ACM COMPUTING SURVEYS, 2021, 53 (06)
[48]   Metamorphic Detection of Repackaged Malware [J].
Singh, Shirish ;
Kaiser, Gail .
2021 IEEE/ACM 6TH INTERNATIONAL WORKSHOP ON METAMORPHIC TESTING (MET 2021), 2021, :9-16
[49]   Android Malware Detection Using Hybrid Analysis and Machine Learning Technique [J].
Yang, Fan ;
Zhuang, Yi ;
Wang, Jun .
CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 :565-575
[50]   AUTOMATIC BEHAVIOUR-BASED ANALYSIS AND CLASSIFICATION SYSTEM FOR MALWARE DETECTION [J].
Devesa, Jaime ;
Santos, Igor ;
Cantero, Xabier ;
Penya, Yoseba K. ;
Bringas, Pablo G. .
ICEIS 2010: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 2: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2010, :395-399