DETECTION OF MALWARE USING AN ARTIFICIAL NEURAL NETWORK BASED ON ADAPTIVE RESONANT THEORY

被引:1
|
作者
Bukhanov, D. G. [1 ]
Polyakov, V. M. [1 ]
Redkina, M. A. [1 ]
机构
[1] Belgorod State Technol Univ, Belgorod, Russia
来源
关键词
malware; analysis of portable executable files; control flow graph; vectorization; deobfuscation; artificial neural networks based on adaptive resonance theory; clustering;
D O I
10.17223/20710410/52/4
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The process of detecting malicious code by anti-virus systems is considered. The main part of this process is the procedure for analyzing a file or process. Artificial neural networks based on the adaptive-resonance theory are proposed to use as a method of analysis. The graph2vec vectorization algorithm is used to represent the analyzed program codes in numerical format. Despite the fact that the use of this vectorization method ignores the semantic relationships between the sequence of executable commands, it allows to reduce the analysis time without significant loss of accuracy. The use of an artificial neural network ART-2m with a hierarchical memory structure made it possible to reduce the classification time for a malicious file. Reducing the classification time allows to set more memory levels and increase the similarity parameter, which leads to an improved classification quality. Experiments show that with this approach to detecting malicious software, similar files can be recognized by both size and behavior.
引用
收藏
页码:69 / 82
页数:14
相关论文
共 50 条
  • [21] Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features
    Saxe, Joshua
    Berlin, Konstantin
    2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2015, : 11 - 20
  • [22] Research on Malware Variant Detection Method Based on Deep Neural Network
    Xing Jianhua
    Si Jing
    Zhang Yongjing
    Li Wei
    Zheng Yuning
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 144 - 147
  • [23] Applying Convolutional Neural Network for Malware Detection
    Chen, Chia-Mei
    Wang, Shi-Hao
    Wen, Dan-Wei
    Lai, Gu-Hsin
    Sun, Ming-Kung
    2019 IEEE 10TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY (ICAST 2019), 2019, : 490 - 494
  • [24] A Novel Android Malware Detection Approach Based on Convolutional Neural Network
    Zhang, Yi
    Yang, Yuexiang
    Wang, Xiaolei
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 144 - 149
  • [25] Android Malware Detection Methods Based on Convolutional Neural Network: A Survey
    Shu, Longhui
    Dong, Shi
    Su, Huadong
    Huang, Junjie
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2023, 7 (05): : 1330 - 1350
  • [26] A Neural Network-Based Approach for Cryptographic Function Detection in Malware
    Jia, Li
    Zhou, Anmin
    Jia, Peng
    Liu, Luping
    Wang, Yan
    Liu, Liang
    IEEE ACCESS, 2020, 8 : 23506 - 23521
  • [27] NADM: Neural Network for Android Detection Malware
    Nguyen Viet Duc
    Pham Thanh Giang
    PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (SOICT 2018), 2018, : 449 - 455
  • [28] Study on Theory and Applied Method for Structure Damage Detection Based on Artificial Neural Network
    Weng Guangyuan
    Wang sheliang
    ADVANCES IN MANAGEMENT OF TECHNOLOGY, PT 2, 2008, : 137 - 141
  • [29] Application of artificial neural network and information theory to detection of insulators
    李卫东
    唐丽艳
    宋家骅
    柳焯
    Journal of Harbin Institute of Technology, 2000, (03) : 32 - 36
  • [30] The design and testing of a neural controller based on artificial neural network theory using labview facilities
    Alshareefi, Hamid
    Lupu, Ciprian
    Ismail, Laith
    Duc Luu, Lich
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2021, 83 (03): : 35 - 46