Automated, Reliable Zero-Day Malware Detection Based on Autoencoding Architecture

被引:12
|
作者
Kim, Chiho [1 ]
Chang, Sang-Yoon [2 ]
Kim, Jonghyun [3 ]
Lee, Dongeun [1 ]
Kim, Jinoh [1 ]
机构
[1] Texas A&M Univ, Dept Comp Sci, Commerce, TX 75428 USA
[2] Univ Colorado, Dept Comp Sci, Colorado Springs, CO 80918 USA
[3] Elect Telecommun Res Inst, Cybersecur Res Div, Daejeon 34129, South Korea
关键词
Zero-day detection; malware detection; evasion attacks; adversarial attacks; autoencoder; one-class classification; semi-supervised learning; ATTACKS;
D O I
10.1109/TNSM.2023.3251282
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While a body of studies has been carried out for malware detection with its significance, they are often limited to known malware patterns due to the reliance on signature-based or supervised learning approaches. The semi-supervised learning approach would be an option for identifying previously unseen patterns (i.e., zero-day detection); however, our preliminary study reveals critical limitations from existing methods, including (i) the profiling-based approach using an autoencoder can provide better detection but is sensitive to the threshold setting, and (ii) one-class (OC) classification does not require a manual threshold discovery but may be limited with low detection rates. In this paper, we present a new detection method incorporating the concept of autoencoding and OC classification, designed to benefit from strong abstraction by neural networks (using an autoencoder) and the removal of the complex threshold selection (using an OC classifier). For this combined architecture, a challenge is concurrent training of the autoencoder and the OC classifier, which may cause an ill-suited learner due to no reference to malware instances. To this end, we introduce a new model selection method that discovers well-optimized models from a variety of combinations. The experimental results performed with public malware datasets (Meraz'18 and Drebin) show the effectiveness of our presented methods with up to 97.1% accuracy, comparable to the supervised learning-based detection. We also examine the impact of evading attacks using adversarial attack tools, the result of which shows resilience to malware variants with over 99% detection rates.
引用
收藏
页码:3900 / 3914
页数:15
相关论文
共 50 条
  • [31] Efficient content-based detection of zero-day worms
    Akritidis, P
    Anagnostakis, K
    Markatos, EP
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 837 - 843
  • [32] Cyber resilience recovery model to combat zero-day malware attacks
    Tran, Hiep
    Campos-Nanez, Enrique
    Fomin, Pavel
    Wasek, James
    COMPUTERS & SECURITY, 2016, 61 : 19 - 31
  • [33] A framework for zero-day vulnerabilities detection and prioritization
    Singh, Umesh Kumar
    Joshi, Chanchala
    Kanellopoulos, Dimitris
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 164 - 172
  • [34] Zero-Day Threats Detection for Critical Infrastructures
    Nkongolo, Mike
    Tokmak, Mahmut
    SOUTH AFRICAN INSTITUTE OF COMPUTER SCIENTISTS AND INFORMATION TECHNOLOGISTS, SAICSIT 2023, 2023, 1878 : 32 - 47
  • [35] RETRACTED: A hybrid layered architecture for detection and analysis of network based Zero-day attack (Retracted article)
    Singh, Saurabh
    Sharma, Pradip Kumar
    Moon, Seo Yeon
    Park, Jong Hyuk
    COMPUTER COMMUNICATIONS, 2017, 106 : 100 - 106
  • [36] A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture
    Liu, Wenyan
    Chen, Fucai
    Hu, Hongchao
    Cheng, Guozhen
    Huo, Shumin
    Liang, Hao
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 50 - 53
  • [37] Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities
    Barros, Pedro H.
    Chagas, Eduarda T. C.
    Oliveira, Leonardo B.
    Queiroz, Fabiane
    Ramos, Heitor S.
    COMPUTERS & SECURITY, 2022, 120
  • [38] Detection of zero-day attacks: An unsupervised port-based approach
    Blaise, Agathe
    Bouet, Mathieu
    Conan, Vania
    Secci, Stefano
    COMPUTER NETWORKS, 2020, 180 (180)
  • [39] Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
    Holm, Hannes
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4895 - 4904
  • [40] Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques
    Ibrahim Hairab, Belal
    Aslan, Heba K.
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    ELECTRONICS, 2023, 12 (03)