Low-Resource Malware Family Detection by Cross-Family Knowledge Transfer
-
Published:2022-12-12
Issue:24
Volume:11
Page:4148
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Lin Yan, Xu Guoai, Du Chunlai, Xu GuoshengORCID, Liu Shucen
Abstract
Low-resource malware families are highly susceptible to being overlooked when using machine learning models or deep learning models for automated detection because of the small amount of data samples. When we target to train a classifier for a low-resource malware family, the training data using the family itself is not sufficient to train a good classifier. In this work, we study the relationship between different malware families and improve the performance of the malware detection model based on machine learning method in low-resource malware family detection. First, we propose an empirical supportive score to measure the transfer quality and find that transferring performance varies a lot between different malware families. Second, we propose a Sequential Family Selection (SFS) algorithm to select multiple families as the training data. With SFS, we only transfer knowledge from several supportive families to target low-resource families. We conduct experiments on 16 families and 4 malware detection models, the results show that our model could outperform best baselines by 2.29% on average and our algorithm achieves 14.16% improvement in accuracy at the highest. Third, we study the transferred knowledge and find that our algorithm could capture the common characteristics between different malware families by proposing a supportive score and achieve good detection performance in the low-resource malware family. Our algorithm could also be applicable to image detection and signal detection.
Funder
National Natural Science Foundation of China China Postdoctoral Science Foundation
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference53 articles.
1. Allix, K., Bissyandé, T.F., Klein, J., and Le Traon, Y. (2016, January 14–15). AndroZoo: Collecting Millions of Android Apps for the Research Community. Proceedings of the 13th International Conference on Mining Software Repositories (MSR’16), Austin, TX, USA. 2. Li, L., Gao, J., Hurier, M., Kong, P., Bissyandé, T.F., Bartel, A., Klein, J., and Traon, Y.L. (2017). Androzoo++: Collecting millions of android apps and their metadata for the research community. arXiv. 3. Zhou, Y., and Jiang, X. (2012, January 24–25). Dissecting android malware: Characterization and evolution. Proceedings of the 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, USA. 4. Tran, T.K., Sato, H., and Kubo, M. (2019, January 26–29). Image-based unknown malware classification with few-shot learning models. Proceedings of the 2019 Seventh International Symposium on Computing and Networking Workshops (CANDARW), Nagasaki, Japan. 5. Chai, Y., Du, L., Qiu, J., Yin, L., and Tian, Z. (2022). Dynamic prototype network based on sample adaptation for few-shot malware detection. IEEE Trans. Knowl. Data Eng.
|
|