Data Augmentation Based Malware Detection using Convolutional Neural
Networks
- URL: http://arxiv.org/abs/2010.01862v1
- Date: Mon, 5 Oct 2020 08:58:07 GMT
- Title: Data Augmentation Based Malware Detection using Convolutional Neural
Networks
- Authors: Ferhat Ozgur Catak, Javed Ahmed, Kevser Sahinbas, Zahid Hussain Khand
- Abstract summary: Cyber-attacks have been extensively seen due to the increase of malware in the cyber world.
The most important feature of this type of malware is that they change shape as they propagate from one computer to another.
This paper aims at providing an image augmentation enhanced deep convolutional neural network models for the detection of malware families in a metamorphic malware environment.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Recently, cyber-attacks have been extensively seen due to the everlasting
increase of malware in the cyber world. These attacks cause irreversible damage
not only to end-users but also to corporate computer systems. Ransomware
attacks such as WannaCry and Petya specifically targets to make critical
infrastructures such as airports and rendered operational processes inoperable.
Hence, it has attracted increasing attention in terms of volume, versatility,
and intricacy. The most important feature of this type of malware is that they
change shape as they propagate from one computer to another. Since standard
signature-based detection software fails to identify this type of malware
because they have different characteristics on each contaminated computer. This
paper aims at providing an image augmentation enhanced deep convolutional
neural network (CNN) models for the detection of malware families in a
metamorphic malware environment. The main contributions of the paper's model
structure consist of three components, including image generation from malware
samples, image augmentation, and the last one is classifying the malware
families by using a convolutional neural network model. In the first component,
the collected malware samples are converted binary representation to 3-channel
images using windowing technique. The second component of the system create the
augmented version of the images, and the last component builds a classification
model. In this study, five different deep convolutional neural network model
for malware family detection is used.
Related papers
- MASKDROID: Robust Android Malware Detection with Masked Graph Representations [56.09270390096083]
We propose MASKDROID, a powerful detector with a strong discriminative ability to identify malware.
We introduce a masking mechanism into the Graph Neural Network based framework, forcing MASKDROID to recover the whole input graph.
This strategy enables the model to understand the malicious semantics and learn more stable representations, enhancing its robustness against adversarial attacks.
arXiv Detail & Related papers (2024-09-29T07:22:47Z) - Understanding crypter-as-a-service in a popular underground marketplace [51.328567400947435]
Crypters are pieces of software whose main goal is to transform a target binary so it can avoid detection from Anti Viruses (AVs) applications.
The crypter-as-a-service model has gained popularity, in response to the increased sophistication of detection mechanisms.
This paper provides the first study on an online underground market dedicated to crypter-as-a-service.
arXiv Detail & Related papers (2024-05-20T08:35:39Z) - New Approach to Malware Detection Using Optimized Convolutional Neural
Network [0.0]
This paper proposes a new convolutional deep learning neural network to accurately and effectively detect malware with high precision.
The baseline model initially achieves 98% accurate rate but after increasing the depth of the CNN model, its accuracy reaches 99.183.
To further solidify the effectiveness of this CNN model, we use the improved model to make predictions on new malware samples within our dataset.
arXiv Detail & Related papers (2023-01-26T15:06:47Z) - Self-Supervised Vision Transformers for Malware Detection [0.0]
This paper presents SHERLOCK, a self-supervision based deep learning model to detect malware based on the Vision Transformer (ViT) architecture.
Our proposed model is also able to outperform state-of-the-art techniques for multi-class malware classification of types and family with macro-F1 score of.497 and.491 respectively.
arXiv Detail & Related papers (2022-08-15T07:49:58Z) - Malware Squid: A Novel IoT Malware Traffic Analysis Framework using
Convolutional Neural Network and Binary Visualisation [2.309914459672557]
We introduce a novel IoT malware traffic analysis approach using neural network and binary visualisation.
The prime motivation of the proposed approach is to faster detect and classify new malware (zero-day malware)
arXiv Detail & Related papers (2021-09-08T00:21:45Z) - Exploring Structure Consistency for Deep Model Watermarking [122.38456787761497]
The intellectual property (IP) of Deep neural networks (DNNs) can be easily stolen'' by surrogate model attack.
We propose a new watermarking methodology, namely structure consistency'', based on which a new deep structure-aligned model watermarking algorithm is designed.
arXiv Detail & Related papers (2021-08-05T04:27:15Z) - EvilModel: Hiding Malware Inside of Neural Network Models [3.9303867698406707]
We present a method that delivers malware covertly and detection-evadingly through neural network models.
Experiments show that 36.9MB of malware can be embedded into a 178MB-AlexNet model within 1% accuracy loss.
We hope this work could provide a referenceable scenario for the defense on neural network-assisted attacks.
arXiv Detail & Related papers (2021-07-19T02:44:31Z) - Reversible Watermarking in Deep Convolutional Neural Networks for
Integrity Authentication [78.165255859254]
We propose a reversible watermarking algorithm for integrity authentication.
The influence of embedding reversible watermarking on the classification performance is less than 0.5%.
At the same time, the integrity of the model can be verified by applying the reversible watermarking.
arXiv Detail & Related papers (2021-04-09T09:32:21Z) - Classifying Malware Images with Convolutional Neural Network Models [2.363388546004777]
In this paper, we use several convolutional neural network (CNN) models for static malware classification.
The Inception V3 model achieves a test accuracy of 99.24%, which is better than the accuracy of 98.52% achieved by the current state-of-the-art system.
arXiv Detail & Related papers (2020-10-30T07:39:30Z) - Adversarial Attacks on Binary Image Recognition Systems [78.78811131936622]
We study adversarial attacks on models for binary (i.e. black and white) image classification.
In contrast to colored and grayscale images, the search space of attacks on binary images is extremely restricted.
We introduce a new attack algorithm called SCAR, designed to fool classifiers of binary images.
arXiv Detail & Related papers (2020-10-22T14:57:42Z) - Online Alternate Generator against Adversarial Attacks [144.45529828523408]
Deep learning models are notoriously sensitive to adversarial examples which are synthesized by adding quasi-perceptible noises on real images.
We propose a portable defense method, online alternate generator, which does not need to access or modify the parameters of the target networks.
The proposed method works by online synthesizing another image from scratch for an input image, instead of removing or destroying adversarial noises.
arXiv Detail & Related papers (2020-09-17T07:11:16Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.