Automated, Reliable Zero-Day Malware Detection Based on Autoencoding Architecture

被引:12
|
作者
Kim, Chiho [1 ]
Chang, Sang-Yoon [2 ]
Kim, Jonghyun [3 ]
Lee, Dongeun [1 ]
Kim, Jinoh [1 ]
机构
[1] Texas A&M Univ, Dept Comp Sci, Commerce, TX 75428 USA
[2] Univ Colorado, Dept Comp Sci, Colorado Springs, CO 80918 USA
[3] Elect Telecommun Res Inst, Cybersecur Res Div, Daejeon 34129, South Korea
关键词
Zero-day detection; malware detection; evasion attacks; adversarial attacks; autoencoder; one-class classification; semi-supervised learning; ATTACKS;
D O I
10.1109/TNSM.2023.3251282
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While a body of studies has been carried out for malware detection with its significance, they are often limited to known malware patterns due to the reliance on signature-based or supervised learning approaches. The semi-supervised learning approach would be an option for identifying previously unseen patterns (i.e., zero-day detection); however, our preliminary study reveals critical limitations from existing methods, including (i) the profiling-based approach using an autoencoder can provide better detection but is sensitive to the threshold setting, and (ii) one-class (OC) classification does not require a manual threshold discovery but may be limited with low detection rates. In this paper, we present a new detection method incorporating the concept of autoencoding and OC classification, designed to benefit from strong abstraction by neural networks (using an autoencoder) and the removal of the complex threshold selection (using an OC classifier). For this combined architecture, a challenge is concurrent training of the autoencoder and the OC classifier, which may cause an ill-suited learner due to no reference to malware instances. To this end, we introduce a new model selection method that discovers well-optimized models from a variety of combinations. The experimental results performed with public malware datasets (Meraz'18 and Drebin) show the effectiveness of our presented methods with up to 97.1% accuracy, comparable to the supervised learning-based detection. We also examine the impact of evading attacks using adversarial attack tools, the result of which shows resilience to malware variants with over 99% detection rates.
引用
收藏
页码:3900 / 3914
页数:15
相关论文
共 50 条
  • [41] HONEYCYBER: AUTOMATED SIGNATURE GENERATION FOR ZERO-DAY POLYMORPHIC WORMS
    Mohammed, Mohssen M. Z. E.
    Chan, H. Anthony
    Ventura, Neco
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 980 - 985
  • [42] Towards Automated Distributed Containment of Zero-Day Network Worms
    Shahzad, Khurram
    Woodhead, Steve
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [43] Zero-Day Attack Detection using Ensemble Technique
    Wangde, Fawaz, I
    Mulay, Shivam P.
    Adhao, Rahul B.
    Pachghare, Vinod K.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (05): : 551 - 557
  • [44] A Hybrid Detection Approach For Zero-day Polymorphic Shellcodes
    Chen Ting
    Zhang Xiaosong
    Liu Zhi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 45 - 49
  • [45] Distributed Detection of Zero-Day Network Traffic Flows
    Miao, Yuantian
    Pan, Lei
    Rajasegarar, Sutharshan
    Zhang, Jun
    Leckie, Christopher
    Xiang, Yang
    DATA MINING, AUSDM 2017, 2018, 845 : 173 - 191
  • [46] Zero-day attack detection: a systematic literature review
    Ahmad, Rasheed
    Alsmadi, Izzat
    Alhamdani, Wasim
    Tawalbeh, Lo'ai
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (10) : 10733 - 10811
  • [47] SimCSE for Encrypted Traffic Detection and Zero-Day Attack Detection
    Bar, Rotem
    Hajaj, Chen
    IEEE ACCESS, 2022, 10 : 56952 - 56960
  • [48] A Survey on Zero-Day Polymorphic Worm Detection Techniques
    Kaur, Ratinder
    Singh, Maninder
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03): : 1520 - 1549
  • [49] Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
    Ali, Shamshair
    Rehman, Saif Ur
    Imran, Azhar
    Adeem, Ghazif
    Iqbal, Zafar
    Kim, Ki-Il
    ELECTRONICS, 2022, 11 (23)
  • [50] Breakthrough to Adaptive and Cost-Aware Hardware-Assisted Zero-Day Malware Detection: A Reinforcement Learning-Based Approach
    He, Zhangying
    Makrani, Hosein Mohammadi
    Rafatirad, Setareh
    Homayoun, Houman
    Sayadi, Hossein
    2022 IEEE 40TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2022), 2022, : 231 - 238