Detection of Malicious Code Variants Based on Deep Learning

With the development of the Internet, malicious code attacks have increased exponentially, with malicious code variants ranking as a key threat to Internet security. The ability to detect variants of malicious code is critical for protection against security breaches, data theft, and other dangers. Current methods for recognizing malicious code have demonstrated poor detection accuracy and low detection speeds. This paper proposed a novel method that used deep learning to improve the detection of malware variants. In prior research, deep learning demonstrated excellent performance in image recognition. To implement our proposed detection method, we converted the malicious code into grayscale images. Then, the images were identified and classified using a convolutional neural network (CNN) that could extract the features of the malware images automatically. In addition, we utilized a bat algorithm to address the data imbalance among different malware families. To test our approach, we conducted a series of experiments on malware image data from Vision Research Lab. The experimental results demonstrated that our model achieved good accuracy and speed as compared with other malware detection models.

[1]  Ayumu Kubota,et al.  Kernel-based Behavior Analysis for Android Malware Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[2]  Albert Y. Zomaya,et al.  Distribution Based Workload Modelling of Continuous Queries in Clouds , 2017, IEEE Transactions on Emerging Topics in Computing.

[3]  InSeon Yoo,et al.  Visualizing windows executable viruses using self-organizing maps , 2004, VizSEC/DMSEC '04.

[4]  Yanan Du,et al.  Quantum-inspired glowworm swarm optimisation and its application , 2017, Int. J. Comput. Sci. Math..

[5]  Albert Y. Zomaya,et al.  Particle Swarm Optimization based dictionary learning for remote sensing big data , 2015, Knowl. Based Syst..

[6]  John R. Goodall,et al.  Visual analysis of code security , 2010, VizSec '10.

[7]  B. S. Manjunath,et al.  Malware images: visualization and automatic classification , 2011, VizSec '11.

[8]  Felix C. Freiling,et al.  Visual analysis of malware behavior using treemaps and thread graphs , 2009, 2009 6th International Workshop on Visualization for Cyber Security.

[9]  Eul Gyu Im,et al.  Malware analysis method using visualization of binary files , 2013, RACS.

[10]  Yu Xue,et al.  Improved bat algorithm with optimal forage strategy and random disturbance strategy , 2016, Int. J. Bio Inspired Comput..

[11]  Somesh Jha,et al.  Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[12]  Nathan S. Netanyahu,et al.  DeepSign: Deep learning for automatic malware signature generation and classification , 2015, 2015 International Joint Conference on Neural Networks (IJCNN).

[13]  Zhihua Cui,et al.  Bat algorithm with triangle-flipping strategy for numerical optimization , 2017, International Journal of Machine Learning and Cybernetics.

[14]  Daniel Díaz-Pernil,et al.  Bio-inspired parallel computing of representative geometrical objects of holes of binary 2D-images , 2017, Int. J. Bio Inspired Comput..

[15]  Jinjun Chen,et al.  Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things , 2019, J. Parallel Distributed Comput..

[16]  Zhifeng Xie,et al.  General central firefly algorithm based on different learning time , 2017, Int. J. Comput. Sci. Math..

[17]  Yu Xue,et al.  A novel oriented cuckoo search algorithm to improve DV-Hop performance for cyber-physical systems , 2017, J. Parallel Distributed Comput..

[18]  S. Sitharama Iyengar,et al.  A Survey on Malware Detection Using Data Mining Techniques , 2017, ACM Comput. Surv..

[19]  Vinod Yegneswaran,et al.  A comparative assessment of malware classification using binary texture analysis and dynamic analysis , 2011, AISec '11.

[20]  Christopher Krügel,et al.  Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[21]  Jürgen Schmidhuber,et al.  Deep learning in neural networks: An overview , 2014, Neural Networks.

[22]  Rajiv Ranjan,et al.  Elasticity management of Streaming Data Analytics Flows on clouds , 2017, J. Comput. Syst. Sci..

[23]  Jinjun Chen,et al.  High Performance Computing for Cyber Physical Social Systems by Using Evolutionary Multi-Objective Optimization Algorithm , 2020, IEEE Transactions on Emerging Topics in Computing.

[24]  Xin-She Yang,et al.  A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.

[25]  Yi-Ning Quan,et al.  Remote sensing image fusion based on shearlet and genetic algorithm , 2017, Int. J. Bio Inspired Comput..

[26]  Daniel A. Keim,et al.  A Survey of Visualization Systems for Malware Analysis , 2015, EuroVis.

[27]  Trevor Darrell,et al.  Caffe: Convolutional Architecture for Fast Feature Embedding , 2014, ACM Multimedia.