CNN based zero-day malware detection using small binary segments

被引:5
|
作者
Wen, Qiaokun [1 ]
Chow, K. P. [1 ]
机构
[1] Univ Hong Kong, Hong Kong, Peoples R China
关键词
Malware detection; Malware segments detection; CNN;
D O I
10.1016/j.fsidi.2021.301128
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware detection is always an important task in digital forensics. With the advancement of technology, malware have become more and more polymorphic. In the process of digital investigation, forensics always cannot get the entire file of the malware. For example, when conducting corporate cybersecurity forensics, because the limit length of network packages, packets capture tools established by different companies often fail to get the entire file. Otherwise, deleting files may also cause residues of malware segments. Because we even do not know which part the segment we get is, so, we cannot use much domain knowledge to do the detection. Therefore, this paper proposes to detect malwares according to very small binary fragments of PE files by using a CNN-based model. Datasets especially test set are often one of the most difficult problems in zero-day malware detection, because it means that the virus has never appeared before. In this paper, we collect the data by taking advantage of the differences in antivirus tools at different time points. The experiments are performed on malwares of different lengths, positions, and combinations. Through experiments, we found that only a short segment is needed to achieve a relatively good accuracy. In the end, for a random piece of continuous malicious code, we achieved an accuracy of up to 0.86 when the length of continuous fragments is 60,000 bytes. For noncontiguous and unordered random pieces of malicious code, we get an accuracy of up to 0.83 using only 1024 bytes (1 KB) length fragments. And when using 60,000 bytes length fragment as the baseline, we can finally receive a 0.91 accuracy. (c) 2021 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Social Media Zero-Day Attack Detection Using TensorFlow
    Topcu, Ahmet Ercan
    Alzoubi, Yehia Ibrahim
    Elbasi, Ersin
    Camalan, Emre
    ELECTRONICS, 2023, 12 (17)
  • [32] When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection
    He, Zhangying
    Miari, Tahereh
    Makrani, Hosein Mohammadi
    Aliasgari, Mehrdad
    Homayoun, Houman
    Sayadi, Hossein
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 85 - 90
  • [33] Efficient content-based detection of zero-day worms
    Akritidis, P
    Anagnostakis, K
    Markatos, EP
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 837 - 843
  • [34] Detection of Zero-Day Attacks using CNN and LSTM in Networked Autonomous Systems 'IEEE CNS 23 Poster'
    El Alami, Hassan
    Rawat, Danda B.
    2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [35] Cyber resilience recovery model to combat zero-day malware attacks
    Tran, Hiep
    Campos-Nanez, Enrique
    Fomin, Pavel
    Wasek, James
    COMPUTERS & SECURITY, 2016, 61 : 19 - 31
  • [36] A framework for zero-day vulnerabilities detection and prioritization
    Singh, Umesh Kumar
    Joshi, Chanchala
    Kanellopoulos, Dimitris
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 164 - 172
  • [37] Zero-Day Threats Detection for Critical Infrastructures
    Nkongolo, Mike
    Tokmak, Mahmut
    SOUTH AFRICAN INSTITUTE OF COMPUTER SCIENTISTS AND INFORMATION TECHNOLOGISTS, SAICSIT 2023, 2023, 1878 : 32 - 47
  • [38] EZAC: Encrypted Zero-day Applications Classification using CNN and K-Means
    Li, Yan
    Lu, Yifei
    Li, Shuren
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 378 - 383
  • [39] Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities
    Barros, Pedro H.
    Chagas, Eduarda T. C.
    Oliveira, Leonardo B.
    Queiroz, Fabiane
    Ramos, Heitor S.
    COMPUTERS & SECURITY, 2022, 120
  • [40] Detection of zero-day attacks: An unsupervised port-based approach
    Blaise, Agathe
    Bouet, Mathieu
    Conan, Vania
    Secci, Stefano
    COMPUTER NETWORKS, 2020, 180 (180)