An Efficient Convolutional Neural Network with Transfer Learning for Malware Classification

被引:7
|
作者
AlGarni, Musaad Darwish [1 ]
AlRoobaea, Roobaea [1 ]
Almotiri, Jasem [1 ]
Ullah, Syed Sajid [2 ]
Hussain, Saddam [3 ]
Umar, Fazlullah [4 ]
机构
[1] Taif Univ, Coll Comp & Informat Technol, Taif 21974, Saudi Arabia
[2] Univ Agder UiA, Dept Informat & Commun Technol, N-4898 Grimstad, Norway
[3] Hazara Univ, Dept Informat Technol, Mansehra 21120, Kpk, Pakistan
[4] Khana e Noor Univ, Dept Informat Technol, Shashdarak 1001, Kabul, Afghanistan
关键词
Compendex;
D O I
10.1155/2022/4841741
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rising prevalence of malicious software (malware) attacks represent a serious threat to online safety in the modern era. Malware is a threat to anyone who uses the Internet since it steals data and causes damage to computer systems. In addition, the exponential growth of malware hazards that affect many computer users, corporations, and governments has made malware detection, a popular issue in academic study. Current malware detection methods are slow and ineffectual because they rely on static and dynamic analysis of malware signatures and behavior patterns to detect unknown malware in real-time. Thus, this paper discusses the role of deep convolution neural networks in malware classification and solutions for utilizing machine learning to detect and classify malware families through transfer learning. We proposed a CNN pretrained model learning to classify malware families. The experiment was conducted using two classification datasets, including Malimg and ImageNet. We classified the Malimg dataset, which has turned malware binaries into malware images by using Portable Executable. The result shows that the EfficientNet3 model achieved a high accuracy of 99.93%.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] AN XCEPTION CONVOLUTIONAL NEURAL NETWORK FOR MALWARE CLASSIFICATION WITH TRANSFER LEARNING
    Lo, Wai Weng
    Yang, Xu
    Wang, Yapeng
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [2] Malware Traffic Classification Using Convolutional Neural Network for Representation Learning
    Wang, Wei
    Zhu, Ming
    Zeng, Xuewen
    Ye, Xiaozhou
    Sheng, Yiqiang
    2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 712 - 717
  • [3] The use of Convolutional Neural Network for Malware Classification
    Sajjad, Shahrukh
    Jiana, Bi
    Sajja, Shah Zaib
    PROCEEDINGS OF 2020 IEEE 9TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE (DDCLS'20), 2020, : 1136 - 1140
  • [4] A Hierarchical Convolutional Neural Network for Malware Classification
    Gibert, Daniel
    Mateu, Carles
    Planes, Jordi
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
  • [5] Convolutional Neural Network with Transfer Learning for Rice Type Classification
    Patel, Vaibhav Amit
    Joshi, Manjunath V.
    TENTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2017), 2018, 10696
  • [6] Image Classification Based on transfer Learning of Convolutional neural network
    Wang, Yunyan
    Wang, Chongyang
    Luo, Lengkun
    Zhou, Zhigang
    PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 7506 - 7510
  • [7] Malware classification through image processing with a convolutional neural network
    Marin, David
    Orozco-Rosas, Ulises
    Picos, Kenia
    OPTICS AND PHOTONICS FOR INFORMATION PROCESSING XVI, 2022, 12225
  • [8] Android malware classification using convolutional neural network and LSTM
    Hosseini, Soodeh
    Nezhad, Ali Emamali
    Seilani, Hossein
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2021, 17 (04) : 307 - 318
  • [9] Android malware classification using convolutional neural network and LSTM
    Soodeh Hosseini
    Ali Emamali Nezhad
    Hossein Seilani
    Journal of Computer Virology and Hacking Techniques, 2021, 17 : 307 - 318
  • [10] Convolutional neural networks and extreme learning machines for malware classification
    Mugdha Jain
    William Andreopoulos
    Mark Stamp
    Journal of Computer Virology and Hacking Techniques, 2020, 16 : 229 - 244