ABSTRACT
In this paper, we build on top of the MalConv neural networks learning architecture which was initially designed for malware/benign classification. We evaluate the transfer learning of MalConv for malware multi-class classification by extending its contribution in several directions: (1) We assess MalConv performance on a multi-classification problem using a new dataset composed of solely malware samples belonging to different malware families, (2) we evaluate MalConv on the raw bytes data as well as on the opcodes extracted from the reversed assembly samples and compare the results, (3) we validate the MalConv findings about regularization, and (4) we study MalConv performance when using a medium size dataset and limited computational resources and GPU. The obtained results show that MalConv performs equally well for multi-classification and its performance on raw byte sequences is comparable to opcodes sequences. DeCov regularization is shown to improve the accuracy results better than other regularization techniques.
- Keras: The python deep learning library. https://keras.io/. Accessed: 2018-07-14.Google Scholar
- Y. Awad, M. Nassar, and H. Safa. Modeling malware as a language. In 2018 IEEE International Conference on Communications (ICC), pages 1--6. IEEE, 2018.Google Scholar
Cross Ref
- J. Barker. Malware detection in executables using neural networks. https://devblogs.nvidia.com/malware-detection-neural-networks/. Accessed: 2018-07-14.Google Scholar
- M. Cogswell, F. Ahmed, R. Girshick, L. Zitnick, and D. Batra. Reducing over-fitting in deep networks by decorrelating representations. arXiv preprint arXiv:1511.06068, 2015.Google Scholar
- Y. N. Dauphin, A. Fan, M. Auli, and D. Grangier. Language modeling with gated convolutional networks. arXiv preprint arXiv:1612.08083, 2016.Google Scholar
- C. Eagle. The IDA pro book. No Starch Press, 2011.Google Scholar
- O. Ferrand. How to detect the cuckoo sandbox and to strengthen it? Journal of Computer Virology and Hacking Techniques, 11(1):51--58, 2015.Google Scholar
Cross Ref
- D. Gibert Llauradó. Convolutional neural networks for malware classification. Master's thesis, Universitat Politècnica de Catalunya, 2016.Google Scholar
- S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural computation, 9(8):1735--1780, 1997. Google Scholar
Digital Library
- S. Ioffe and C. Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167, 2015.Google Scholar
- J.-Y. Kim, S.-J. Bu, and S.-B. Cho. Malware detection using deep transferred generative adversarial networks. In International Conference on Neural Information Processing, pages 556--564. Springer, 2017.Google Scholar
Cross Ref
- Y. Kim. Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882, 2014.Google Scholar
- B. Kolosnjaji, A. Zarras, G. Webster, and C. Eckert. Deep learning for classification of malware system call sequences. In Australasian Joint Conference on Artificial Intelligence, pages 137--149. Springer, 2016.Google Scholar
Digital Library
- P. Li, L. Liu, D. Gao, and M. K. Reiter. On challenges in evaluating malware clustering. In International Workshop on Recent Advances in Intrusion Detection, pages 238--255. Springer, 2010. Google Scholar
Digital Library
- T. Mikolov, K. Chen, G. Corrado, and J. Dean. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781, 2013.Google Scholar
- M. Nassar and H. Safa. Throttling malware families in 2d. arXiv preprint arXiv:1901.10590, 2019.Google Scholar
- L. Nataraj, S. Karthikeyan, G. Jacob, and B. Manjunath. Malware images: visualization and automatic classification. In Proceedings of the 8th international symposium on visualization for cyber security, page 4. ACM, 2011. Google Scholar
Digital Library
- E. Raff, J. Barker, J. Sylvester, R. Brandon, B. Catanzaro, and C. Nicholas. Malware detection by eating a whole exe. arXiv preprint arXiv:1710.09435, 2017.Google Scholar
- E. Rezende, G. Ruppert, T. Carvalho, F. Ramos, and P. DeGeus. Malicious software classification using transfer learning of resnet-50 deep neural network. In 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA), pages 1011--1014. IEEE, 2017.Google Scholar
Cross Ref
- R. Ronen, M. Radu, C. Feuerstein, E. Yom-Tov, and M. Ahmadi. Microsoft malware classification challenge. arXiv preprint arXiv:1802.10135, 2018.Google Scholar
- C. Sandbox. Automated malware analysis. https://cuckoosandbox.org, 2013.Google Scholar
- E. C. R. Shin, D. Song, and R. Moazzezi. Recognizing functions in binaries with neural networks. In USENIX Security Symposium, pages 611--626, 2015. Google Scholar
Digital Library
- H. T. Siegelmann and E. D. Sontag. On the computational power of neural nets. Journal of computer and system sciences, 50(1):132--150, 1995. Google Scholar
Digital Library
- N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov. Dropout: a simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research, 15(1):1929--1958, 2014. Google Scholar
Digital Library
- J. Sylvester. Malconv: Lessons learned from deep learning on executables. http://www.jsylvest.com/blog/2017/12/malconv/. Accessed: 2018-07-14.Google Scholar
Index Terms
Transfer learning for malware multi-classification
Recommendations
Toward an Automatic, Online Behavioral Malware Classification System
Malware authors are increasingly using specialized toolkits and obfuscation techniques to modify existing malware and avoid detection by traditional antivirus software. The resulting proliferation of obfuscated malware variants poses a challenge to ...
Transfer Learning Approach for Malware Images Classification on Android Devices Using Deep Convolutional Neural Network
AbstractMore malware types are being developed today to carry out numerous destructive operations due to the Internet and software industries' rapid expansion. Malware variants cannot be detected using conventional signature-based detection techniques. ...
Identifying Unknown Android Malware with Feature Extractions and Classification Techniques
Android malware unfortunately have little difficulty to sneak in marketplaces. While known malware and their variants are nowadays quite well detected by antivirus scanners, new unknown malware, which are fundamentally different from others (e.g. "0-day"...






Comments