Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders

被引:140
|
作者
Kim, Jin-Young [1 ]
Bu, Seok-Jun [1 ]
Cho, Sung-Bae [1 ]
机构
[1] Yonsei Univ, Dept Comp Sci, Seoul, South Korea
关键词
Malicious software; Zero-day attack; Generative adversarial network; Autoencoder; Transferlearning; Robustness to noise;
D O I
10.1016/j.ins.2018.04.092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting malicious software (malware) is important for computer security. Among the different types of malware, zero-day malware is problematic because it cannot be removed by antivirus systems. Existing malware detection mechanisms use stored malware characteristics, which hinders detecting zero-day attacks where altered malware is generated to avoid detection by antivirus systems. To detect malware including zero-day attacks robustly, this paper proposes a novel method called transferred deep-convolutional generative adversarial network (tDCGAN), which generates fake malware and learns to distinguish it from real malware. The data generated from a random distribution are similar but not identical to the real data: it includes modified features compared with real data. The detector learns various malware features using real data and modified data generated by the tDCGAN based on a deep autoencoder (DAE), which extracts appropriate features and stabilizes the GAN training. Before training the GAN, the DAE learns malware characteristics, produces general data, and transfers this capacity for stable training of the GAN generator. The trained discriminator passes down the ability to capture malware features to the detector, using transfer learning. We show that tDCGAN achieves 95.74% average classification accuracy which is higher than that of other models and increases the learning stability. It is also the most robust against modeled zero-day attacks compared to others. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:83 / 102
页数:20
相关论文
共 50 条
  • [21] Combining Supervised and Unsupervised Learning for Zero-Day Malware Detection
    Comar, Prakash Mandayam
    Liu, Lei
    Saha, Sabyasachi
    Tan, Pang-Ning
    Nucci, Antonio
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2022 - 2030
  • [22] Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection
    Chen, Yi-Ming
    Yang, Chun-Hsien
    Chen, Guo-Chung
    [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [23] Malware detection method based on image analysis and generative adversarial networks
    Liu, Yanhua
    Li, Jiaqi
    Liu, Baoxu
    Gao, Xiaoling
    Liu, Ximeng
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (22):
  • [24] Android malware detection through generative adversarial networks
    Amin, Muhammad
    Shah, Babar
    Sharif, Aizaz
    Alit, Tamleek
    Kim, Ki-Il
    Anwar, Sajid
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (02)
  • [25] Efficient detection of zero-day Android Malware using Normalized Bernoulli Naive Bayes
    Sayfullina, Luiza
    Eirola, Emil
    Komashinsky, Dmitry
    Palumbo, Paolo
    Miche, Yoan
    Lendasse, Amaury
    Karhunen, Juha
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 198 - 205
  • [26] Network Behavioral Analysis for Zero-Day Malware Detection - A Case Study
    Ganame, Karim
    Allaire, Marc Andre
    Zagdene, Ghassen
    Boudar, Oussama
    [J]. INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017), 2017, 10618 : 169 - 181
  • [27] Detection of zero-day attacks in computer networks using combined classification
    Gavari Bami, Hamid
    Moharamkhani, Elaheh
    Zadmehr, Behrouz
    Najafpoor, Vahid
    Shokouhifar, Mohammad
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (27):
  • [28] Adversarial Attacks Against Image-Based Malware Detection Using Autoencoders
    Carey, Alycia N.
    Mai, Huy
    Zhan, Justin
    Mehmood, Asif
    [J]. PATTERN RECOGNITION AND TRACKING XXXII, 2021, 11735
  • [29] A zero-day resistant malware detection method for securing Cloud using SVM and Sandboxing Techniques
    Kumar, Saket
    Singh, Chandra Bhim Bhan
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1397 - 1402
  • [30] Towards Optimizing Malware Detection: An Approach Based on Generative Adversarial Networks and Transformers
    Alzahem, Ayyub
    Boulila, Wadii
    Driss, Maha
    Koubaa, Anis
    Almomani, Iman
    [J]. COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2022, 2022, 13501 : 598 - 610