Empowering convolutional networks for malware classification and analysis
Title | Empowering convolutional networks for malware classification and analysis |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Kolosnjaji, B., Eraisha, G., Webster, G., Zarras, A., Eckert, C. |
Conference Name | 2017 International Joint Conference on Neural Networks (IJCNN) |
Date Published | May 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5090-6182-2 |
Keywords | Convolutional codes, convolutional networks, convolutional neural constructs, data mining, disassembled malicious binary execution sequences, feature extraction, feature plain vectorization, feedforward neural constructs, feedforward neural nets, Feedforward neural networks, hierarchical feature extraction, Human Behavior, information feature extraction, instruction n-grams convolution, invasive software, learning (artificial intelligence), malicious executable classification, malicious executable detection, Malware, malware analysis, malware analytics, malware classification, malware families, metadata, Metrics, Neural networks, pattern classification, PE files, portable executable files, privacy, pubcrawl, Resiliency, statistical analysis, statistical machine learning |
Abstract | Performing large-scale malware classification is increasingly becoming a critical step in malware analytics as the number and variety of malware samples is rapidly growing. Statistical machine learning constitutes an appealing method to cope with this increase as it can use mathematical tools to extract information out of large-scale datasets and produce interpretable models. This has motivated a surge of scientific work in developing machine learning methods for detection and classification of malicious executables. However, an optimal method for extracting the most informative features for different malware families, with the final goal of malware classification, is yet to be found. Fortunately, neural networks have evolved to the state that they can surpass the limitations of other methods in terms of hierarchical feature extraction. Consequently, neural networks can now offer superior classification accuracy in many domains such as computer vision and natural language processing. In this paper, we transfer the performance improvements achieved in the area of neural networks to model the execution sequences of disassembled malicious binaries. We implement a neural network that consists of convolutional and feedforward neural constructs. This architecture embodies a hierarchical feature extraction approach that combines convolution of n-grams of instructions with plain vectorization of features derived from the headers of the Portable Executable (PE) files. Our evaluation results demonstrate that our approach outperforms baseline methods, such as simple Feedforward Neural Networks and Support Vector Machines, as we achieve 93% on precision and recall, even in case of obfuscations in the data. |
URL | http://ieeexplore.ieee.org/document/7966340/ |
DOI | 10.1109/IJCNN.2017.7966340 |
Citation Key | kolosnjaji_empowering_2017 |
- pattern classification
- malware
- Malware Analysis
- malware analytics
- malware classification
- malware families
- metadata
- Metrics
- Neural networks
- malicious executable detection
- PE files
- portable executable files
- privacy
- pubcrawl
- Resiliency
- statistical analysis
- statistical machine learning
- Feedforward neural networks
- convolutional networks
- convolutional neural constructs
- Data mining
- disassembled malicious binary execution sequences
- feature extraction
- feature plain vectorization
- feedforward neural constructs
- feedforward neural nets
- Convolutional codes
- hierarchical feature extraction
- Human behavior
- information feature extraction
- instruction n-grams convolution
- invasive software
- learning (artificial intelligence)
- malicious executable classification