PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection

被引:14
|
作者
Won, Dong-Ok
Jang, Yong-Nam
Lee, Seong-Whan [1 ]
机构
[1] Hallym Univ, Dept Artificial Intelligence Convergence, Chunchon 24252, South Korea
关键词
Malware; Generative adversarial networks; Generators; Training; Training data; Big Data; Linear programming; Analogous malware detection; generative adversarial networks; malware augmentation; malware data; zero-day malware; NEURAL-NETWORK;
D O I
10.1109/TETC.2022.3170544
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Zero-day malicious software (malware) refers to a previously unknown or newly discovered software vulnerability. The fundamental objective of this paper is to enhance detection for analogous zero-day malware by efficient learning to plausible generated data. To detect zero-day malware, we proposed a malware training framework based on the generated analogous malware data using generative adversarial networks (PlausMal-GAN). Thus, the PlausMal-GAN can suitably produce analogous zero-day malware images with high quality and high diversity from the existing malware data. The discriminator, as a detector, learns various malware features using both real and generated malware images. In terms of performance, the proposed framework showed higher and more stable performances for the analogous zero-day malware images, which can be assumed to be analogous zero-day malware data. We obtained reliable accuracy performances in the proposed PlausMal-GAN framework with representative GAN models (i.e., deep convolutional GAN, least-squares GAN, Wasserstein GAN with gradient penalty, and evolutionary GAN). These results indicate that the use of the proposed framework is beneficial for the detection and prediction of numerous and analogous zero-day malware data from noted malware when developing and updating malware detection systems.
引用
收藏
页码:82 / 94
页数:13
相关论文
共 50 条
  • [1] Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders
    Kim, Jin-Young
    Bu, Seok-Jun
    Cho, Sung-Bae
    [J]. INFORMATION SCIENCES, 2018, 460 : 83 - 102
  • [2] Zero-Day Malware Detection
    Gandotra, Ekta
    Bansal, Divya
    Sofat, Sanjccv
    [J]. 2016 SIXTH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2016), 2016, : 171 - 175
  • [3] Detection of Zero-day Malware Based on the Analysis of Opcode Sequences
    Zolotukhin, Mikhail
    Hamalainen, Timo
    [J]. 2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
  • [4] Big Data Framework for Zero-Day Malware Detection
    Gupta, Deepak
    Rani, Rinkle
    [J]. CYBERNETICS AND SYSTEMS, 2018, 49 (02) : 103 - 121
  • [5] Use of Data Visualisation for Zero-Day Malware Detection
    Venkatraman, Sitalakshmi
    Alazab, Mamoun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [6] Adversarial Variational Modality Reconstruction and Regularization for Zero-Day Malware Variants Similarity Detection
    Molloy, Christopher
    Banks, Jeremy
    Ding, Steven H. H.
    Charland, Philippe
    Walenstein, Andrew
    Li, Litao
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2022, : 1131 - 1136
  • [7] Automated, Reliable Zero-Day Malware Detection Based on Autoencoding Architecture
    Kim, Chiho
    Chang, Sang-Yoon
    Kim, Jonghyun
    Lee, Dongeun
    Kim, Jinoh
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 3900 - 3914
  • [8] A survey of zero-day malware attacks and its detection methodology
    Radhakrishnan, Kiran
    Menon, Rajeev R.
    Nath, Hiran V.
    [J]. PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 533 - 539
  • [9] Deep Learning for Zero-day Malware Detection and Classification: A Survey
    Deldar, Fatemeh
    Abadi, Mahdi
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (02)
  • [10] Zero-Day Malware Classification and Detection Using Machine Learning
    Kumar J.
    Rajendran B.
    Sudarsan S.D.
    [J]. SN Computer Science, 5 (1)