A novel machine learning approach for detecting first-time-appeared malware

被引:15
|
作者
Shaukat, Kamran [1 ,2 ,3 ]
Luo, Suhuai [2 ]
Varadharajan, Vijay [4 ]
机构
[1] Torrens Univ, Ctr Artificial Intelligence Res & Optimizat AIRO, Design & Creat Technol Vert, Ultimo, NSW 2007, Australia
[2] Univ Newcastle, Sch Informat & Phys Sci, Callaghan, Australia
[3] Univ Punjab, Dept Data Sci, Lahore 54890, Pakistan
[4] Univ Newcastle, Adv Cyber Secur Engn Res Ctr ACSRC, Callaghan, Australia
关键词
Deep learning; Machine learning; Artificial intelligence; Zero -day malware; Polymorphic; Malware; Cybersecurity; Evolving attacks; Security analytics; CLASSIFICATION;
D O I
10.1016/j.engappai.2023.107801
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional malware detection approaches have the overhead of feature extraction, the requirement of domain experts, and are time-consuming and resource-intensive. Learning-based approaches are the mainstay of malware detection as they overcome most of these challenges by significantly improving the detection effectiveness and providing a low false positive rate. The exponential growth of malware variants and first-time-appeared malware, which includes polymorphic and zero-day attacks, are some of the significant challenges to learning-based malware detectors. These challenges have catastrophic impacts on the detection effectiveness of these learningbased malware detectors. This paper proposes a novel deep learning-based framework to detect first-timeappeared malware effectively and efficiently by providing better performance than conventional malware detection approaches. First, it translates and visualises each Windows portable executable (PE) file into a coloured image to eliminate the overhead of feature extraction and the need for domain experts to analyse the features. In the subsequent step, a fine-tuned deep learning model is used to extract the deep features from the last fully connected layer. The step has reduced the cost of training required by the deep learning models if used for end-to-end classification. The third step selects the most important and influential features through a powerful feature selection algorithm. The most important features are then fed to a one-class classifier for final detection. With the one-class classifier, an enclosed boundary around the features of benign data is constructed. Anything outside the boundary is declared as an anomaly/malicious. It has enhanced the framework's ability to detect evolving, unseen, polymorphic, and zero-day attacks, as well as reducing the problem of overfitting. The detection effectiveness of the proposed framework is validated with state-of-the-art deep learning models and conventional approaches. The proposed framework has outperformed with an accuracy of 99.30% on the Malimg dataset. The Wilcoxon signed-rank test is used to validate the statistical significance of the proposed framework. It is evident from the results that the proposed framework is effective and can be used in the defence industry, resulting in more powerful and robust solutions against zero-day and polymorphic attacks.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] A Novel Malware Analysis for Malware Detection and Classification using Machine Learning Algorithms
    Sethi, Kamalakanta
    Chaudhary, Shankar Kumar
    Tripathy, Bata Krishan
    Bera, Padmalochan
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 107 - 113
  • [22] Machine Learning Methods for Detecting Internet-of-Things (IoT) Malware
    Yaokumah, Winfred
    Appati, Justice Kwame
    Kumah, Daniel
    INTERNATIONAL JOURNAL OF COGNITIVE INFORMATICS AND NATURAL INTELLIGENCE, 2021, 15 (04)
  • [23] A Novel and Dedicated Machine Learning Model for Malware Classification
    Li, Miles Q.
    Fung, Benjamin C. M.
    Charland, Philippe
    Ding, Steven H. H.
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES (ICSOFT), 2021, : 617 - 628
  • [24] A Novel Machine Learning Approach for Android Malware Detection Based on the Co-Existence of Features
    Odat, Esraa
    Yaseen, Qussai M.
    IEEE ACCESS, 2023, 11 : 15471 - 15484
  • [25] StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware
    Chen, Sen
    Xue, Minhui
    Tang, Zhushou
    Xu, Lihua
    Zhu, Haojin
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 377 - 388
  • [26] Method of Detecting Malware Through Analysis of Opcodes Frequency with Machine Learning Technique
    Woo, Sang-Uk
    Kim, Dong-Hee
    Chung, Tai-Myoung
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 1019 - 1024
  • [27] Detecting Malware Families and Subfamilies using Machine Learning Algorithms: An Empirical Study
    Odat, Esraa
    Alazzam, Batool
    Yaseen, Qussai M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (02) : 761 - 765
  • [28] Towards Deep Learning-Based Approach for Detecting Android Malware
    Booz, Jarrett
    McGiff, Josh
    Hatcher, William
    Yu, Wei
    Nguyen, James
    Lu, Chao
    INTERNATIONAL JOURNAL OF SOFTWARE INNOVATION, 2019, 7 (04) : 1 - 24
  • [29] Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis
    Darabian, Hamid
    Homayounoot, Sajad
    Dehghantanha, Ali
    Hashemi, Sattar
    Karimipour, Hadis
    Parizi, Reza M.
    Choo, Kim-Kwang Raymond
    JOURNAL OF GRID COMPUTING, 2020, 18 (02) : 293 - 303
  • [30] Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis
    Hamid Darabian
    Sajad Homayounoot
    Ali Dehghantanha
    Sattar Hashemi
    Hadis Karimipour
    Reza M. Parizi
    Kim-Kwang Raymond Choo
    Journal of Grid Computing, 2020, 18 : 293 - 303