A novel machine learning approach for detecting first-time-appeared malware

被引:15
|
作者
Shaukat, Kamran [1 ,2 ,3 ]
Luo, Suhuai [2 ]
Varadharajan, Vijay [4 ]
机构
[1] Torrens Univ, Ctr Artificial Intelligence Res & Optimizat AIRO, Design & Creat Technol Vert, Ultimo, NSW 2007, Australia
[2] Univ Newcastle, Sch Informat & Phys Sci, Callaghan, Australia
[3] Univ Punjab, Dept Data Sci, Lahore 54890, Pakistan
[4] Univ Newcastle, Adv Cyber Secur Engn Res Ctr ACSRC, Callaghan, Australia
关键词
Deep learning; Machine learning; Artificial intelligence; Zero -day malware; Polymorphic; Malware; Cybersecurity; Evolving attacks; Security analytics; CLASSIFICATION;
D O I
10.1016/j.engappai.2023.107801
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional malware detection approaches have the overhead of feature extraction, the requirement of domain experts, and are time-consuming and resource-intensive. Learning-based approaches are the mainstay of malware detection as they overcome most of these challenges by significantly improving the detection effectiveness and providing a low false positive rate. The exponential growth of malware variants and first-time-appeared malware, which includes polymorphic and zero-day attacks, are some of the significant challenges to learning-based malware detectors. These challenges have catastrophic impacts on the detection effectiveness of these learningbased malware detectors. This paper proposes a novel deep learning-based framework to detect first-timeappeared malware effectively and efficiently by providing better performance than conventional malware detection approaches. First, it translates and visualises each Windows portable executable (PE) file into a coloured image to eliminate the overhead of feature extraction and the need for domain experts to analyse the features. In the subsequent step, a fine-tuned deep learning model is used to extract the deep features from the last fully connected layer. The step has reduced the cost of training required by the deep learning models if used for end-to-end classification. The third step selects the most important and influential features through a powerful feature selection algorithm. The most important features are then fed to a one-class classifier for final detection. With the one-class classifier, an enclosed boundary around the features of benign data is constructed. Anything outside the boundary is declared as an anomaly/malicious. It has enhanced the framework's ability to detect evolving, unseen, polymorphic, and zero-day attacks, as well as reducing the problem of overfitting. The detection effectiveness of the proposed framework is validated with state-of-the-art deep learning models and conventional approaches. The proposed framework has outperformed with an accuracy of 99.30% on the Malimg dataset. The Wilcoxon signed-rank test is used to validate the statistical significance of the proposed framework. It is evident from the results that the proposed framework is effective and can be used in the defence industry, resulting in more powerful and robust solutions against zero-day and polymorphic attacks.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Are Machine Learning Models for Malware Detection Ready for Prime Time?
    Cavallaro L.
    Kinder J.
    Pendlebury F.
    Pierazzi F.
    Massacci F.
    Bodden E.
    Sabetta A.
    IEEE Security and Privacy, 2023, 21 (02): : 53 - 56
  • [32] Detecting Encrypted Traffic: A Machine Learning Approach
    Cha, Seunghun
    Kim, Hyoungshick
    INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 54 - 65
  • [33] A hybrid malware analysis approach for identifying process-injection malware based on machine learning
    Chen C.-M.
    Lin Z.-Y.
    Ou Y.-H.
    Lin J.-W.
    International Journal of Security and Networks, 2024, 19 (01) : 20 - 30
  • [34] Feature Optimization for Run Time Analysis of Malware in Windows Operating System using Machine Learning Approach
    Irshad, Areeba
    Maurya, Ritesh
    Dutta, Malay Kishore
    Burget, Radim
    Uher, Vaclav
    2019 42ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2019, : 255 - 260
  • [35] A Cautionary Tale About Detecting Malware Using Hardware Performance Counters and Machine Learning
    Zhou, Boyou
    Gupta, Anmol
    Jahanshahi, Rasoul
    Egele, Manuel
    Joshi, Ajay
    IEEE DESIGN & TEST, 2021, 38 (03) : 39 - 50
  • [36] Detecting Unknown Malware on Android by Machine Learning Using the Feature of Dalvik Operation Code
    Wang Quanmin
    Li Zhenguo
    Zheng Shuang
    Gu Shi
    Sun Yanfeng
    Wang Kaiyang
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND INFORMATION ENGINEERING (ICACIE 2017), 2017, 119 : 53 - 57
  • [37] Comparative Study of Static Analysis and Machine Learning Approaches for Detecting Android Banking Malware
    Ahmed, Alaa M.
    Saeed, Mogeeb A.
    Hamood, Amr A.
    Alazab, Abduljabar A.
    Ahmed, Kamel A.
    2023 3rd International Conference on Emerging Smart Technologies and Applications, eSmarTA 2023, 2023,
  • [38] A Cautionary Tale about Detecting Malware Using Hardware Performance Counters and Machine Learning
    Zhou, Boyou
    Gupta, Anmol
    Jahanshahi, Rasoul
    Egele, Manuel
    Joshi, Ajay
    IEEE Design and Test, 2021, 38 (03): : 39 - 50
  • [39] A Novel Machine Learning Approach for Detecting the Brain Abnormalities from MRI Structural Images
    Singh, Lavneet
    Chetty, Girija
    Sharma, Dharmendra
    PATTERN RECOGNITION IN BIOINFORMATICS, 2012, 7632 : 94 - 105
  • [40] Machine learning approach of detecting anomalies and forecasting time-series of IoT devices
    Malki, Amer
    Atlam, El-Sayed
    Gad, Ibrahim
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (11) : 8973 - 8986