Classification of Malware by Using Structural Entropy on Convolutional Neural Networks

被引:0
|
作者
Gibert, Daniel [1 ]
Mateu, Carles [2 ]
Planes, Jordi [2 ]
Vicens, Ramon [1 ]
机构
[1] Blueliv, Leap Value, Barcelona, Spain
[2] Univ Lleida, Lleida, Spain
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The number of malicious programs has grown both in number and in sophistication. Analyzing the malicious intent of vast amounts of data requires huge resources and thus, effective categorization of malware is required. In this paper, the content of a malicious program is represented as an entropy stream, where each value describes the amount of entropy of a small chunk of code in a specific location of the file. Wavelet transforms are then applied to this entropy signal to describe the variation in the entropic energy. Motivated by the visual similarity between streams of entropy of malicious software belonging to the same family, we propose a file agnostic deep learning approach for categorization of malware. Our method exploits the fact that most variants are generated by using common obfuscation techniques and that compression and encryption algorithms retain some properties present in the original code. This allows us to find discriminative patterns that almost all variants in a family share. Our method has been evaluated using the data provided by Microsoft for the BigData Innovators Gathering Anti-Malware Prediction Challenge, and achieved promising results in comparison with the State of the Art.
引用
收藏
页码:7759 / 7764
页数:6
相关论文
共 50 条
  • [1] Malware Classification using Deep Convolutional Neural Networks
    Kornish, David
    Geary, Justin
    Sansing, Victor
    Ezekiel, Soundararajan
    Pearlstein, Larry
    Njilla, Laurent
    [J]. 2018 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR), 2018,
  • [2] Using convolutional neural networks for classification of malware represented as images
    Daniel Gibert
    Carles Mateu
    Jordi Planes
    Ramon Vicens
    [J]. Journal of Computer Virology and Hacking Techniques, 2019, 15 : 15 - 28
  • [3] Malware Binary Image Classification Using Convolutional Neural Networks
    Kiger, John
    Ho, Shen-Shyang
    Heydari, Vahid
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 469 - 478
  • [4] Using convolutional neural networks for classification of malware represented as images
    Gibert, Daniel
    Mateu, Carles
    Planes, Jordi
    Vicens, Ramon
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2019, 15 (01) : 15 - 28
  • [5] Behavioral Malware Classification using Convolutional Recurrent Neural Networks
    Alsulami, Bander
    Mancoridis, Spiros
    [J]. PROCEEDINGS OF THE 2018 13TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2018), 2018, : 103 - 111
  • [6] Malware Classification with Deep Convolutional Neural Networks
    Kalash, Mahmoud
    Rochan, Mrigank
    Mohammed, Noman
    Bruce, Neil D. B.
    Wang, Yang
    Iqbal, Farkhund
    [J]. 2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
  • [7] Convolutional Neural Networks for Classification of Malware Assembly Code
    Gibert, Daniel
    Bejar, Javier
    Mateu, Carles
    Planes, Jordi
    Solis, Daniel
    Vicens, Ramon
    [J]. RECENT ADVANCES IN ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT, 2017, 300 : 221 - 226
  • [8] Benchmarking Convolutional and Recurrent Neural Networks for Malware Classification
    Safa, Haidar
    Nassar, Mohamed
    Al Orabi, Wael Al Rahal
    [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 561 - 566
  • [9] A Novel Approach for Android Malware Detection and Classification using Convolutional Neural Networks
    Lekssays, Ahmed
    Falah, Bouchaib
    Abufardeh, Sameer
    [J]. ICSOFT: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES, 2020, : 606 - 614
  • [10] Convolutional neural networks and extreme learning machines for malware classification
    Mugdha Jain
    William Andreopoulos
    Mark Stamp
    [J]. Journal of Computer Virology and Hacking Techniques, 2020, 16 : 229 - 244