CNN based zero-day malware detection using small binary segments

被引:5
|
作者
Wen, Qiaokun [1 ]
Chow, K. P. [1 ]
机构
[1] Univ Hong Kong, Hong Kong, Peoples R China
关键词
Malware detection; Malware segments detection; CNN;
D O I
10.1016/j.fsidi.2021.301128
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware detection is always an important task in digital forensics. With the advancement of technology, malware have become more and more polymorphic. In the process of digital investigation, forensics always cannot get the entire file of the malware. For example, when conducting corporate cybersecurity forensics, because the limit length of network packages, packets capture tools established by different companies often fail to get the entire file. Otherwise, deleting files may also cause residues of malware segments. Because we even do not know which part the segment we get is, so, we cannot use much domain knowledge to do the detection. Therefore, this paper proposes to detect malwares according to very small binary fragments of PE files by using a CNN-based model. Datasets especially test set are often one of the most difficult problems in zero-day malware detection, because it means that the virus has never appeared before. In this paper, we collect the data by taking advantage of the differences in antivirus tools at different time points. The experiments are performed on malwares of different lengths, positions, and combinations. Through experiments, we found that only a short segment is needed to achieve a relatively good accuracy. In the end, for a random piece of continuous malicious code, we achieved an accuracy of up to 0.86 when the length of continuous fragments is 60,000 bytes. For noncontiguous and unordered random pieces of malicious code, we get an accuracy of up to 0.83 using only 1024 bytes (1 KB) length fragments. And when using 60,000 bytes length fragment as the baseline, we can finally receive a 0.91 accuracy. (c) 2021 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
    Holm, Hannes
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4895 - 4904
  • [42] Detection of zero-day attacks in computer networks using combined classification
    Gavari Bami, Hamid
    Moharamkhani, Elaheh
    Zadmehr, Behrouz
    Najafpoor, Vahid
    Shokouhifar, Mohammad
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (27):
  • [43] A Hybrid Detection Approach For Zero-day Polymorphic Shellcodes
    Chen Ting
    Zhang Xiaosong
    Liu Zhi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 45 - 49
  • [44] Distributed Detection of Zero-Day Network Traffic Flows
    Miao, Yuantian
    Pan, Lei
    Rajasegarar, Sutharshan
    Zhang, Jun
    Leckie, Christopher
    Xiang, Yang
    DATA MINING, AUSDM 2017, 2018, 845 : 173 - 191
  • [45] Zero-day attack detection: a systematic literature review
    Ahmad, Rasheed
    Alsmadi, Izzat
    Alhamdani, Wasim
    Tawalbeh, Lo'ai
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (10) : 10733 - 10811
  • [46] SimCSE for Encrypted Traffic Detection and Zero-Day Attack Detection
    Bar, Rotem
    Hajaj, Chen
    IEEE ACCESS, 2022, 10 : 56952 - 56960
  • [47] A Survey on Zero-Day Polymorphic Worm Detection Techniques
    Kaur, Ratinder
    Singh, Maninder
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03): : 1520 - 1549
  • [48] Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
    Ali, Shamshair
    Rehman, Saif Ur
    Imran, Azhar
    Adeem, Ghazif
    Iqbal, Zafar
    Kim, Ki-Il
    ELECTRONICS, 2022, 11 (23)
  • [49] Breakthrough to Adaptive and Cost-Aware Hardware-Assisted Zero-Day Malware Detection: A Reinforcement Learning-Based Approach
    He, Zhangying
    Makrani, Hosein Mohammadi
    Rafatirad, Setareh
    Homayoun, Houman
    Sayadi, Hossein
    2022 IEEE 40TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2022), 2022, : 231 - 238
  • [50] VisualPhishNet: Zero-Day PhishingWebsite Detection by Visual Similarity
    Abdelnabi, Sahar
    Krombholz, Katharina
    Fritz, Mario
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1681 - 1698