TTDAT: Two-Step Training Dual Attention Transformer for Malware Classification Based on API Call Sequences
-
Published:2023-12-21
Issue:1
Volume:14
Page:92
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Author:
Wang Peng1, Lin Tongcan2ORCID, Wu Di2, Zhu Jiacheng3, Wang Junfeng2
Affiliation:
1. School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China 2. College of Computer Science, Sichuan University, Chengdu 610065, China 3. College of Software Engineering, Sichuan University, Chengdu 610065, China
Abstract
The surge in malware threats propelled by the rapid evolution of the internet and smart device technology necessitates effective automatic malware classification for robust system security. While existing research has primarily relied on some feature extraction techniques, issues such as information loss and computational overhead persist, especially in instruction-level tracking. To address these issues, this paper focuses on the nuanced analysis of API (Application Programming Interface) call sequences between the malware and system and introduces TTDAT (Two-step Training Dual Attention Transformer) for malware classification. TTDAT utilizes Transformer architecture with original multi-head attention and an integrated local attention module, streamlining the encoding of API sequences and extracting both global and local patterns. To expedite detection, we introduce a two-step training strategy: ensemble Transformer models to generate class representation vectors, thereby bolstering efficiency and adaptability. Our extensive experiments demonstrate TTDAT’s effectiveness, showcasing state-of-the-art results with an average F1 score of 0.90 and an accuracy of 0.96.
Funder
Key R&D projects of the Sichuan Science and technology plan Key R&D projects of the Chengdu Science and technology plan
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference49 articles.
1. Aboaoja, F.A., Zainal, A., Ghaleb, F.A., Al-rimy, B.A.S., Eisa, T.A.E., and Elnour, A.A.H. (2022). Malware Detection Issues, Challenges, and Future Directions: A Survey. Appl. Sci., 12. 2. Cryptographic Ransomware Encryption Detection: Survey;Begovic;Comput. Security,2023 3. Molloy, C., Banks, J., Ding, H.S., Charland, P., Walenstein, A., and Li, L. (December, January 28). Adversarial Variational Modality Reconstruction and Regularization for Zero-Day Malware Variants Similarity Detection. Proceedings of the 2022 IEEE International Conference on Data Mining (ICDM), Orlando, FL, USA. 4. Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art;Ling;Comput. Secur.,2023 5. Methods for Automatic Malware Analysis and Classification: A Survey;Int. J. Inf. Comput. Secur.,2022
|
|