A novel machine learning approach for detecting first-time-appeared malware

被引:15
|
作者
Shaukat, Kamran [1 ,2 ,3 ]
Luo, Suhuai [2 ]
Varadharajan, Vijay [4 ]
机构
[1] Torrens Univ, Ctr Artificial Intelligence Res & Optimizat AIRO, Design & Creat Technol Vert, Ultimo, NSW 2007, Australia
[2] Univ Newcastle, Sch Informat & Phys Sci, Callaghan, Australia
[3] Univ Punjab, Dept Data Sci, Lahore 54890, Pakistan
[4] Univ Newcastle, Adv Cyber Secur Engn Res Ctr ACSRC, Callaghan, Australia
关键词
Deep learning; Machine learning; Artificial intelligence; Zero -day malware; Polymorphic; Malware; Cybersecurity; Evolving attacks; Security analytics; CLASSIFICATION;
D O I
10.1016/j.engappai.2023.107801
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional malware detection approaches have the overhead of feature extraction, the requirement of domain experts, and are time-consuming and resource-intensive. Learning-based approaches are the mainstay of malware detection as they overcome most of these challenges by significantly improving the detection effectiveness and providing a low false positive rate. The exponential growth of malware variants and first-time-appeared malware, which includes polymorphic and zero-day attacks, are some of the significant challenges to learning-based malware detectors. These challenges have catastrophic impacts on the detection effectiveness of these learningbased malware detectors. This paper proposes a novel deep learning-based framework to detect first-timeappeared malware effectively and efficiently by providing better performance than conventional malware detection approaches. First, it translates and visualises each Windows portable executable (PE) file into a coloured image to eliminate the overhead of feature extraction and the need for domain experts to analyse the features. In the subsequent step, a fine-tuned deep learning model is used to extract the deep features from the last fully connected layer. The step has reduced the cost of training required by the deep learning models if used for end-to-end classification. The third step selects the most important and influential features through a powerful feature selection algorithm. The most important features are then fed to a one-class classifier for final detection. With the one-class classifier, an enclosed boundary around the features of benign data is constructed. Anything outside the boundary is declared as an anomaly/malicious. It has enhanced the framework's ability to detect evolving, unseen, polymorphic, and zero-day attacks, as well as reducing the problem of overfitting. The detection effectiveness of the proposed framework is validated with state-of-the-art deep learning models and conventional approaches. The proposed framework has outperformed with an accuracy of 99.30% on the Malimg dataset. The Wilcoxon signed-rank test is used to validate the statistical significance of the proposed framework. It is evident from the results that the proposed framework is effective and can be used in the defence industry, resulting in more powerful and robust solutions against zero-day and polymorphic attacks.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware
    Hasan, Hayyan Salman
    Deeb, Hasan Muhammad
    Ladani, Behrouz Tork
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (01): : 59 - 71
  • [2] Detecting Malware with Classification Machine Learning Techniques
    Yusof, Mohd Azahari Mohd
    Abdullah, Zubaile
    Ali, Firkhan Ali Hamid
    Sukri, Khairul Amin Mohamad
    Hussain, Hanizan Shaker
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 167 - 172
  • [3] A Machine Learning Approach for Real Time Android Malware Detection
    Ngoc C Le
    Tien-Manh Nguyen
    Trang Truong
    Ngoc-Dam Nguyen
    Tra Ngo
    2020 RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES (RIVF 2020), 2020, : 347 - 352
  • [4] A Novel approach for detecting malware in Android applications using Deep learning
    Kaushik, Prashant
    Yadav, Pankaj K.
    2018 ELEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2018, : 59 - 62
  • [5] Detecting new obfuscated malware variants: A lightweight and interpretable machine learning approach
    Madamidola, Oladipo A.
    Ngobigha, Felix
    Ez-zizi, Adnane
    INTELLIGENT SYSTEMS WITH APPLICATIONS, 2025, 25
  • [6] An Ensemble Machine Learning Approach for Detecting and Classifying Malware Attacks on Mobile Devices
    Alsharif, Eiman
    Alharby, Maher
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2025,
  • [7] A Novel Malware Analysis Framework for Malware Detection and Classification using Machine Learning Approach
    Sethi, Kamalakanta
    Chaudhary, Shankar Kumar
    Tripathy, Bata Krishan
    Bera, Padmalochan
    ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
  • [8] Detecting Android Malware Based on Extreme Learning Machine
    Sun, Yuxia
    Xie, Yunlong
    Qiu, Zhi
    Pan, Yuchang
    Weng, Jian
    Guo, Song
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 47 - 53
  • [9] Analyzing Various Machine Learning Approaches for Detecting Android Malware
    Dickey, Kyler
    Hwang, Doosung
    Kim, Donghoon
    SOUTHEASTCON 2024, 2024, : 1288 - 1293
  • [10] Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey
    Montes, F.
    Bermejo, J.
    Sanchez, L. E.
    Bermejo, J. R.
    Sicilia, J. A.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (03) : 1119 - 1139