A GAN-EfficientNet-Based Traceability Method for Malicious Code Variant Families

被引:0
|
作者
Li, Li [1 ]
Zhang, Qing [1 ]
Kong, Youran [1 ]
机构
[1] Northeast Forestry Univ, Sch Comp & Control Engn, Harbin 150040, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 80卷 / 01期
关键词
Malicious code variant traceability; feature reuse; lightweight neural networks; code visualization; attention mechanism;
D O I
10.32604/cmc.2024.051916
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the diversity and unpredictability of changes in malicious code, studying the traceability of variant families remains challenging. In this paper, we propose a GAN-EfficientNetV2-based method for tracing families of malicious code variants. This method leverages the similarity in layouts and textures between images of malicious code variants from the same source and their original family of malicious code images. The method includes a lightweight classifier and a simulator. The classifier utilizes the enhanced EfficientNetV2 to categorize malicious code images and can be easily deployed on mobile, embedded, and other devices. The simulator utilizes an enhanced generative adversarial network to simulate different variants of malicious code and generates datasets to validate the model's performance. This process helps identify model vulnerabilities and security risks, facilitating model enhancement and development. The classifier achieves 98.61% and 97.59% accuracy on the MMCC dataset and Malevis dataset, respectively. The simulator's generated image of malicious code variants has an FID value of 155.44 and an IS value of 1.72 +/- 0.42. The classifier's accuracy for tracing the family of malicious code variants is as high as 90.29%, surpassing that of mainstream neural network models. This meets the current demand for high generalization and anti-obfuscation abilities in malicious code classification models due to the rapid evolution of malicious code.
引用
收藏
页码:801 / 818
页数:18
相关论文
共 27 条
  • [1] CNN- and GAN-based classification of malicious code families: A code visualization approach
    Wang, Ziyue
    Wang, Weizheng
    Yang, Yaoqi
    Han, Zhaoyang
    Xu, Dequan
    Su, Chunhua
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 12472 - 12489
  • [2] Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs
    Wang, Shuo
    Wang, Jian
    Song, Yafei
    Li, Song
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2021, 2021
  • [3] Malicious Code Classification Method Based on Deep Forest
    Lu, Xi-Dong
    Duan, Zhe-Min
    Qian, Ye-Kui
    Zhou, Wei
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (05): : 1454 - 1464
  • [4] A Fast Malicious Code Detection Method Based on Feature Fusion
    Wang, Shuo
    Wang, Jian
    Wang, Ya-Nan
    Song, Ya-Fei
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (01): : 57 - 66
  • [5] Malicious Code Family Classification Method Based on Vision Transformer
    Chen, Shi
    Liu, Ying
    Hu, Wei
    Liu, Jianyi
    Gao, Yating
    Lin, Bingjie
    [J]. 2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 704 - 709
  • [6] Detection Method of WEB Malicious Code based on Link Analysis
    Lu Zhiyong
    Sui Sai
    Huang Chengdong
    Wang Xueyu
    [J]. 2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 511 - 514
  • [7] Lightweight Malicious Code Classification Method Based on Improved SqueezeNet
    Li, Li
    Kong, Youran
    Zhang, Qing
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 551 - 567
  • [8] METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION
    Li, Wenwu
    Li, Chao
    Duan, Miyi
    [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 234 - 240
  • [9] A Hybrid Malicious Code Detection Method based on Deep Learning
    Li, Yuancheng
    Ma, Rong
    Jiao, Runhai
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 205 - 215
  • [10] A method for efficient malicious code detection based on conceptual similarity
    Kim, Sungsuk
    Choi, Chang
    Choi, Junho
    Kim, Pankoo
    Kim, Hanil
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 567 - 576