Deep Learning for Zero-day Malware Detection and Classification: A Survey

被引:17
|
作者
Deldar, Fatemeh [1 ]
Abadi, Mahdi [1 ]
机构
[1] Tarbiat Modares Univ, Dept Comp Engn, Jalal Al e Ahmad Hwy, Tehran 1411713116, Iran
基金
美国国家科学基金会;
关键词
Zero-day malware; malware detection and classification; unsupervised; semi-supervised; few-shot; adversarial resistant; deep learning; NEURAL-NETWORKS; FRAMEWORK; ATTACKS; ALGORITHMS;
D O I
10.1145/3605775
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Zero-day malware is malware that has never been seen before or is so new that no anti-malware software can catch it. This novelty and the lack of existing mitigation strategies make zero-day malware challenging to detect and defend against. In recent years, deep learning has become the dominant and leading branch of machine learning in various research fields, including malware detection. Considering the significant threat of zero-day malware to cybersecurity and business continuity, it is necessary to identify deep learning techniques that can somehow be effective in detecting or classifying such malware. But so far, such a comprehensive review has not been conducted. In this article, we study deep learning techniques in terms of their ability to detect or classify zero-day malware. Based on our findings, we propose a taxonomy and divide different zero-day resistant, deep malware detection and classification techniques into four main categories: unsupervised, semi-supervised, few-shot, and adversarial resistant. We compare the techniques in each category in terms of various factors, including deep learning architecture, feature encoding, platform, detection or classification functionality, and whether the authors have performed a zero-day evaluation. We also provide a summary view of the reviewed papers and discuss their main characteristics and challenges.
引用
收藏
页数:37
相关论文
共 50 条
  • [31] Efficient detection of zero-day Android Malware using Normalized Bernoulli Naive Bayes
    Sayfullina, Luiza
    Eirola, Emil
    Komashinsky, Dmitry
    Palumbo, Paolo
    Miche, Yoan
    Lendasse, Amaury
    Karhunen, Juha
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 198 - 205
  • [32] Detection of Zero-day Attacks on IoT
    Reardon, Shay
    Hssayeni, Murtadha D.
    Mahgoub, Imadeldin
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [33] From zero-shot machine learning to zero-day attack detection
    Mohanad Sarhan
    Siamak Layeghy
    Marcus Gallagher
    Marius Portmann
    International Journal of Information Security, 2023, 22 : 947 - 959
  • [34] From zero-shot machine learning to zero-day attack detection
    Sarhan, Mohanad
    Layeghy, Siamak
    Gallagher, Marcus
    Portmann, Marius
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 947 - 959
  • [35] Deep Learning and Zero-Day Traffic Classification: Lessons Learned From a Commercial-Grade Dataset
    Yang, Lixuan
    Finamore, Alessandro
    Jun, Feng
    Rossi, Dario
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (04): : 4103 - 4118
  • [36] Mitigation and Detection of Zero-Day Vulnerabilities
    Sebastian Guisao, Juan
    Toro Rendon, Juan Carlos
    CUADERNO ACTIVA, 2014, (06): : 63 - 67
  • [37] Detection of zero-day attacks in computer networks using combined classification
    Gavari Bami, Hamid
    Moharamkhani, Elaheh
    Zadmehr, Behrouz
    Najafpoor, Vahid
    Shokouhifar, Mohammad
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (27):
  • [38] Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar
    Okazaki, Naonobu
    Usuzaki, Shotaro
    Waki, Tsubasa
    Kawagoe, Hyoga
    Park, Mirang
    Yamaba, Hisaaki
    Aburada, Kentaro
    FUTURE INTERNET, 2024, 16 (08)
  • [39] PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection
    Won, Dong-Ok
    Jang, Yong-Nam
    Lee, Seong-Whan
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (01) : 82 - 94
  • [40] A zero-day resistant malware detection method for securing Cloud using SVM and Sandboxing Techniques
    Kumar, Saket
    Singh, Chandra Bhim Bhan
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1397 - 1402