Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders

被引:140
|
作者
Kim, Jin-Young [1 ]
Bu, Seok-Jun [1 ]
Cho, Sung-Bae [1 ]
机构
[1] Yonsei Univ, Dept Comp Sci, Seoul, South Korea
关键词
Malicious software; Zero-day attack; Generative adversarial network; Autoencoder; Transferlearning; Robustness to noise;
D O I
10.1016/j.ins.2018.04.092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting malicious software (malware) is important for computer security. Among the different types of malware, zero-day malware is problematic because it cannot be removed by antivirus systems. Existing malware detection mechanisms use stored malware characteristics, which hinders detecting zero-day attacks where altered malware is generated to avoid detection by antivirus systems. To detect malware including zero-day attacks robustly, this paper proposes a novel method called transferred deep-convolutional generative adversarial network (tDCGAN), which generates fake malware and learns to distinguish it from real malware. The data generated from a random distribution are similar but not identical to the real data: it includes modified features compared with real data. The detector learns various malware features using real data and modified data generated by the tDCGAN based on a deep autoencoder (DAE), which extracts appropriate features and stabilizes the GAN training. Before training the GAN, the DAE learns malware characteristics, produces general data, and transfers this capacity for stable training of the GAN generator. The trained discriminator passes down the ability to capture malware features to the detector, using transfer learning. We show that tDCGAN achieves 95.74% average classification accuracy which is higher than that of other models and increases the learning stability. It is also the most robust against modeled zero-day attacks compared to others. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:83 / 102
页数:20
相关论文
共 50 条
  • [1] Malware Detection Using Deep Transferred Generative Adversarial Networks
    Kim, Jin-Young
    Bu, Seok-Jun
    Cho, Sung-Bae
    [J]. NEURAL INFORMATION PROCESSING, ICONIP 2017, PT I, 2017, 10634 : 556 - 564
  • [2] PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection
    Won, Dong-Ok
    Jang, Yong-Nam
    Lee, Seong-Whan
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (01) : 82 - 94
  • [3] Zero-Day Malware Detection
    Gandotra, Ekta
    Bansal, Divya
    Sofat, Sanjccv
    [J]. 2016 SIXTH INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING AND SYSTEM DESIGN (ISED 2016), 2016, : 171 - 175
  • [4] Deep Learning for Zero-day Malware Detection and Classification: A Survey
    Deldar, Fatemeh
    Abadi, Mahdi
    [J]. ACM COMPUTING SURVEYS, 2024, 56 (02)
  • [5] CNN based zero-day malware detection using small binary segments
    Wen, Qiaokun
    Chow, K. P.
    [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 38
  • [6] Zero-Day Malware Classification and Detection Using Machine Learning
    Kumar J.
    Rajendran B.
    Sudarsan S.D.
    [J]. SN Computer Science, 5 (1)
  • [7] Detection of Zero-day Malware Based on the Analysis of Opcode Sequences
    Zolotukhin, Mikhail
    Hamalainen, Timo
    [J]. 2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
  • [8] Adversarial Variational Modality Reconstruction and Regularization for Zero-Day Malware Variants Similarity Detection
    Molloy, Christopher
    Banks, Jeremy
    Ding, Steven H. H.
    Charland, Philippe
    Walenstein, Andrew
    Li, Litao
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2022, : 1131 - 1136
  • [9] Multi-view deep learning for zero-day Android malware detection
    Millar, Stuart
    McLaughlin, Niall
    del Rincon, Jesus Martinez
    Miller, Paul
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [10] Automated, Reliable Zero-Day Malware Detection Based on Autoencoding Architecture
    Kim, Chiho
    Chang, Sang-Yoon
    Kim, Jonghyun
    Lee, Dongeun
    Kim, Jinoh
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 3900 - 3914