A Neural Network Approach to a Grayscale Image-Based Multi-File Type Malware Detection System
-
Published:2023-11-30
Issue:23
Volume:13
Page:12888
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Author:
Copiaco Abigail1ORCID, El Neel Leena1ORCID, Nazzal Tasnim1, Mukhtar Husameldin1ORCID, Obaid Walid1
Affiliation:
1. College of Engineering and Information Technology, University of Dubai, Dubai 14143, United Arab Emirates
Abstract
This study introduces an innovative all-in-one malware identification model that significantly enhances convenience and resource efficiency in classifying malware across diverse file types. Traditional malware identification methods involve the extraction of static and dynamic features, followed by comparisons with signature-based databases or machine learning-based classifiers. However, many malware detection applications that rely on transfer learning and image transformation suffer from excessive resource consumption. In recent years, transfer learning has emerged as a powerful tool for developing effective classifiers, leveraging pre-trained neural network models. In this research, we comprehensively explore various pre-trained network architectures, including compact and conventional networks, as well as series and directed acyclic graph configurations for malware classification. Our approach utilizes grayscale transform-based features as a standardized set of characteristics, streamlining malware classification across various file types. To ensure the robustness and generalization of our classification models, we integrate multiple datasets into the training process. Remarkably, we achieve an optimal model with 96% accuracy, while maintaining a modest 5 MB size using the SqueezeNet classifier. Overall, our model efficiently classifies malware across file types, reducing the computational load, which can be useful for cybersecurity professionals and organizations.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference59 articles.
1. Aslam, W., Fraz, M., Rizvi, S., and Saleem, S. (2020, January 14–16). Cross-validation of machine learning algorithms for malware detection using static features of Windows portable executables: A Comparative Study. Proceedings of the IEEE 17th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET), IEEE, Charlotte, NC, USA. 2. The rise of machine learning for detection and classification of malware: Research developments, trends and challenges;Gibert;J. Netw. Comput. Appl.,2020 3. Schultz, M.G., Eskin, E., Zadok, E., and Stolfo, S. (2000, January 14–16). Data mining methods for detection of new malicious executables. Proceedings of the IEEE Symposium on Security and Privacy, S and P 2001, Oakland, CA, USA. 4. Kruegel, C., Kirda, E., Mutz, D., Robertson, W., and Vigna, G. (2005, January 7–9). Polymorphic worm detection using structural information of executables. Proceedings of the Recent Advances in Intrusion Detection: 8th International Symposium, RAID 2005, Seattle, WA, USA. Revised Papers 8. 5. Roundy, K.A., and Miller, B.P. (2010, January 15–17). Hybrid analysis and control of malware. Proceedings of the International Workshop on Recent Advances in Intrusion Detection, Ontario, OT, Canada.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|