Harnessing GPT-2 for Feature Extraction in Malware Detection: A Novel Approach to Cybersecurity
Author:
Basharat Mahmoud1, Omar Marwan2
Affiliation:
1. Capitol Technology University , Maryland , USA 2. Capitol Technology University, Maryland , USA & Illinois Institute of Technology , Chicago , USA
Abstract
Abstract
In the rapidly advancing digital age, the surge in malware complexity presents a formidable challenge to cybersecurity efforts, rendering traditional signature-based detection methods increasingly obsolete. These methods struggle to keep pace with the swift evolution of malware, particularly with the emergence of polymorphic and metamorphic variants designed to bypass conventional detection. This study introduces a groundbreaking approach to malware detection by utilizing GPT-2, a cutting-edge language model developed by OpenAI, specifically for the purpose of feature extraction. By applying GPT-2’s deep learning capabilities to the EMBER and Drebin datasets, this research explores the model’s effectiveness in identifying malware through the intricate patterns present in binary data. Contrary to its original design for natural language processing, GPT-2’s application in this context demonstrates a significant potential for enhancing malware detection strategies. The model’s proficiency in extracting complex features from binary sequences marks a notable advancement over traditional methods, providing a more adaptive and robust mechanism for identifying malicious software. However, the study also acknowledges the challenges associated with the interpretability of deep learning models and their susceptibility to adversarial attacks, underscoring the imperative for ongoing innovation in the field of cybersecurity. This exploration into the unconventional use of GPT-2 for feature extraction in malware detection not only showcases the model’s versatility beyond language tasks but also sets a new precedent for the application of unsupervised learning models in enhancing cybersecurity defenses.
Publisher
Walter de Gruyter GmbH
Reference14 articles.
1. Al Kinoon, M., Omar, M., Mohaisen, M., & Mohaisen, D. (2021). Security Breaches in the Healthcare Domain: A Spatiotemporal Analysis. Proceedings of the 10th International Conference Computational Data and Social Networks – CSoNet, 171–183. Available at: https://doi.org/10.1007/978-3-030-91434-9_16. 2. Biggio, B., Corona, I., Maiorca, D., Nelson, B., Šrndić, N., Laskov, P., Giacinto, G., & Roli, F. (2013). Evasion Attacks against Machine Learning at Test Time. Machine Learning and Knowledge Discovery in Databases, European Conference, ECML PKDD, Part III, Vol. 8190, LNCS, 387–402, Springer. Available at: https://doi.org/10.1007/978-3-642-40994-3_25. 3. Gandotra, E., Bansal, D., & Sofat, S. (2014). Malware Analysis and Classification: A Survey. Journal of Information Security, Vol. 5, Issue 2, 56–64. DOI:10.4236/jis.2014.52006. 4. Kolosnjaji, B., Zarras, A., Webster, G., & Eckert, C. (2018). Deep Learning for Classification of Malware System Call Sequences. 29th Australasian Joint Conference on Artificial Intelligence, 137–153. DOI:10.1007/978-3-319-50127-7_11. 5. Mohammed, D., Omar, M., & Nguyen, V. (2018). Wireless Sensor Network Security: Approaches to Detecting and Avoiding Wormhole Attacks. Journal of Research in Business, Economics and Management, Vol. 10, Issue 2, 1860–1864. Available at: http://www.scitecresearch.com/journals/index.php/jrbem/article/view/1413.
|
|