A novel DL approach to PE malware detection: exploring Glove
vectorization, MCC_RCNN and feature fusion
- URL: http://arxiv.org/abs/2101.08969v3
- Date: Thu, 4 Feb 2021 09:06:02 GMT
- Title: A novel DL approach to PE malware detection: exploring Glove
vectorization, MCC_RCNN and feature fusion
- Authors: Yuzhou Lin
- Abstract summary: We propose the DL-based approaches for detection and use static-based features fed up into models.
We implement a neural network model called MCC_RCNN, comprising of the combination with CNN and RNN.
Our proposed classification methods can obtain a higher prediction accuracy than the other baseline methods.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In recent years, malware becomes more threatening. Concerning the increasing
malware variants, there comes Machine Learning (ML)-based and Deep Learning
(DL)-based approaches for heuristic detection. Nevertheless, the prediction
accuracy of both needs to be improved. In response to the above issues in the
PE malware domain, we propose the DL-based approaches for detection and use
static-based features fed up into models. The contributions are as follows: we
recapitulate existing malware detection methods. That is, we propose a
vec-torized representation model of the malware instruction layer and semantic
layer based on Glove. We implement a neural network model called MCC_RCNN
(Malware Detection and Recurrent Convolutional Neural Network), comprising of
the combination with CNN and RNN. Moreover, we provide a description of feature
fusion in static behavior levels. With the numerical results generated from
several comparative experiments towards evaluating the Glove-based
vectoriza-tion, MCC_RCNN-based classification methodology and feature fusion
stages, our proposed classification methods can obtain a higher prediction
accuracy than the other baseline methods.
Related papers
- A Novel Approach to Malicious Code Detection Using CNN-BiLSTM and Feature Fusion [2.3039261241391586]
This study employs the minhash algorithm to convert binary files of malware into grayscale images.
The study utilizes IDA Pro to decompile and extract opcode sequences, applying N-gram and tf-idf algorithms for feature vectorization.
A CNN-BiLSTM fusion model is designed to simultaneously process image features and opcode sequences, enhancing classification performance.
arXiv Detail & Related papers (2024-10-12T07:10:44Z) - Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification [68.86863899919358]
We introduce a groundbreaking approach to protect GNN models in Machine Learning from model-centric attacks.
Our approach includes a comprehensive verification schema for GNN's integrity, taking into account both transductive and inductive GNNs.
We propose a query-based verification technique, fortified with innovative node fingerprint generation algorithms.
arXiv Detail & Related papers (2023-12-13T03:17:05Z) - A Comparison of Graph Neural Networks for Malware Classification [2.707154152696381]
We train a wide range of Graph Neural Network (GNN) architectures to generate embeddings which we then classify.
We find that our best GNN models outperform previous comparable research involving the well-known MalNet-Tiny Android malware dataset.
arXiv Detail & Related papers (2023-03-22T01:05:57Z) - Flexible Android Malware Detection Model based on Generative Adversarial
Networks with Code Tensor [7.417407987122394]
Existing malware detection methods only target at the existing malicious samples.
In this paper, we propose a novel scheme that detects malware and its variants efficiently.
arXiv Detail & Related papers (2022-10-25T03:20:34Z) - Graph Neural Network-based Android Malware Classification with Jumping
Knowledge [3.408873763213743]
This paper proposes a GNN-based method for Android malware detection by capturing meaningful intra-procedural call path patterns.
A Jumping-Knowledge technique is applied to minimize the effect of the over-smoothing problem.
The proposed method has been extensively evaluated using two benchmark datasets.
arXiv Detail & Related papers (2022-01-19T11:29:02Z) - Malware Detection Using Frequency Domain-Based Image Visualization and
Deep Learning [16.224649756613655]
We propose a novel method to detect and visualize malware through image classification.
The executable binaries are represented as grayscale images obtained from the count of N-grams (N=2) of bytes in the Discrete Cosine Transform domain.
A shallow neural network is trained for classification, and its accuracy is compared with deep-network architectures such as ResNet that are trained using transfer learning.
arXiv Detail & Related papers (2021-01-26T06:07:46Z) - Firearm Detection via Convolutional Neural Networks: Comparing a
Semantic Segmentation Model Against End-to-End Solutions [68.8204255655161]
Threat detection of weapons and aggressive behavior from live video can be used for rapid detection and prevention of potentially deadly incidents.
One way for achieving this is through the use of artificial intelligence and, in particular, machine learning for image analysis.
We compare a traditional monolithic end-to-end deep learning model and a previously proposed model based on an ensemble of simpler neural networks detecting fire-weapons via semantic segmentation.
arXiv Detail & Related papers (2020-12-17T15:19:29Z) - Understanding and Diagnosing Vulnerability under Adversarial Attacks [62.661498155101654]
Deep Neural Networks (DNNs) are known to be vulnerable to adversarial attacks.
We propose a novel interpretability method, InterpretGAN, to generate explanations for features used for classification in latent variables.
We also design the first diagnostic method to quantify the vulnerability contributed by each layer.
arXiv Detail & Related papers (2020-07-17T01:56:28Z) - Scalable Backdoor Detection in Neural Networks [61.39635364047679]
Deep learning models are vulnerable to Trojan attacks, where an attacker can install a backdoor during training time to make the resultant model misidentify samples contaminated with a small trigger patch.
We propose a novel trigger reverse-engineering based approach whose computational complexity does not scale with the number of labels, and is based on a measure that is both interpretable and universal across different network and patch types.
In experiments, we observe that our method achieves a perfect score in separating Trojaned models from pure models, which is an improvement over the current state-of-the art method.
arXiv Detail & Related papers (2020-06-10T04:12:53Z) - A Systematic Approach to Featurization for Cancer Drug Sensitivity
Predictions with Deep Learning [49.86828302591469]
We train >35,000 neural network models, sweeping over common featurization techniques.
We found the RNA-seq to be highly redundant and informative even with subsets larger than 128 features.
arXiv Detail & Related papers (2020-04-30T20:42:17Z) - Rectified Meta-Learning from Noisy Labels for Robust Image-based Plant
Disease Diagnosis [64.82680813427054]
Plant diseases serve as one of main threats to food security and crop production.
One popular approach is to transform this problem as a leaf image classification task, which can be addressed by the powerful convolutional neural networks (CNNs)
We propose a novel framework that incorporates rectified meta-learning module into common CNN paradigm to train a noise-robust deep network without using extra supervision information.
arXiv Detail & Related papers (2020-03-17T09:51:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.