CNN based zero-day malware detection using small binary segments

被引:5
|
作者
Wen, Qiaokun [1 ]
Chow, K. P. [1 ]
机构
[1] Univ Hong Kong, Hong Kong, Peoples R China
关键词
Malware detection; Malware segments detection; CNN;
D O I
10.1016/j.fsidi.2021.301128
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware detection is always an important task in digital forensics. With the advancement of technology, malware have become more and more polymorphic. In the process of digital investigation, forensics always cannot get the entire file of the malware. For example, when conducting corporate cybersecurity forensics, because the limit length of network packages, packets capture tools established by different companies often fail to get the entire file. Otherwise, deleting files may also cause residues of malware segments. Because we even do not know which part the segment we get is, so, we cannot use much domain knowledge to do the detection. Therefore, this paper proposes to detect malwares according to very small binary fragments of PE files by using a CNN-based model. Datasets especially test set are often one of the most difficult problems in zero-day malware detection, because it means that the virus has never appeared before. In this paper, we collect the data by taking advantage of the differences in antivirus tools at different time points. The experiments are performed on malwares of different lengths, positions, and combinations. Through experiments, we found that only a short segment is needed to achieve a relatively good accuracy. In the end, for a random piece of continuous malicious code, we achieved an accuracy of up to 0.86 when the length of continuous fragments is 60,000 bytes. For noncontiguous and unordered random pieces of malicious code, we get an accuracy of up to 0.83 using only 1024 bytes (1 KB) length fragments. And when using 60,000 bytes length fragment as the baseline, we can finally receive a 0.91 accuracy. (c) 2021 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:7
相关论文
共 50 条
  • [11] Deep Learning for Zero-day Malware Detection and Classification: A Survey
    Deldar, Fatemeh
    Abadi, Mahdi
    ACM COMPUTING SURVEYS, 2024, 56 (02)
  • [12] Combining Supervised and Unsupervised Learning for Zero-Day Malware Detection
    Comar, Prakash Mandayam
    Liu, Lei
    Saha, Sabyasachi
    Tan, Pang-Ning
    Nucci, Antonio
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2022 - 2030
  • [13] Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach
    Kumar, Rajesh
    Subbiah, Geetha
    SENSORS, 2022, 22 (07)
  • [14] Zero-day malware detection based on supervised learning algorithms of API call signatures
    Alazab, Mamoun
    Venkatraman, Sitalakshmi
    Watters, Paul
    Alazab, Moutaz
    Conferences in Research and Practice in Information Technology Series, 2010, 121 : 171 - 182
  • [15] Efficient detection of zero-day Android Malware using Normalized Bernoulli Naive Bayes
    Sayfullina, Luiza
    Eirola, Emil
    Komashinsky, Dmitry
    Palumbo, Paolo
    Miche, Yoan
    Lendasse, Amaury
    Karhunen, Juha
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 198 - 205
  • [16] Network Behavioral Analysis for Zero-Day Malware Detection - A Case Study
    Ganame, Karim
    Allaire, Marc Andre
    Zagdene, Ghassen
    Boudar, Oussama
    INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017), 2017, 10618 : 169 - 181
  • [17] Classification and online clustering of zero-day malware
    Jureckova, Olha
    Jurecek, Martin
    Stamp, Mark
    Di Troia, Fabio
    Lorencz, Robert
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (04) : 579 - 592
  • [18] A zero-day resistant malware detection method for securing Cloud using SVM and Sandboxing Techniques
    Kumar, Saket
    Singh, Chandra Bhim Bhan
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1397 - 1402
  • [19] Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar
    Okazaki, Naonobu
    Usuzaki, Shotaro
    Waki, Tsubasa
    Kawagoe, Hyoga
    Park, Mirang
    Yamaba, Hisaaki
    Aburada, Kentaro
    FUTURE INTERNET, 2024, 16 (08)
  • [20] PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection
    Won, Dong-Ok
    Jang, Yong-Nam
    Lee, Seong-Whan
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (01) : 82 - 94