DLGraph: Malware Detection Using Deep Learning and Graph Embedding
Title | DLGraph: Malware Detection Using Deep Learning and Graph Embedding |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Jiang, H., Turki, T., Wang, J. T. L. |
Conference Name | 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA) |
Date Published | dec |
ISBN Number | 978-1-5386-6805-4 |
Keywords | application program interfaces, combined feature vector classification, Deep Learning, DLGraph, Embedded systems, embedded vector, feature extraction, function-call graph, function-call graphs, graph embedding, graph theory, Human Behavior, invasive software, learning (artificial intelligence), malware analysis, malware detection, Metrics, Microsoft Windows, neural nets, noise reduction, pattern classification, privacy, pubcrawl, representation learning, Resiliency, SDA, softmax regression, stacked denoising autoencoders, static analysis, Trojan horses, Windows API calls, Windows application programming interface calls |
Abstract | In this paper we present a new approach, named DLGraph, for malware detection using deep learning and graph embedding. DLGraph employs two stacked denoising autoencoders (SDAs) for representation learning, taking into consideration computer programs' function-call graphs and Windows application programming interface (API) calls. Given a program, we first use a graph embedding technique that maps the program's function-call graph to a vector in a low-dimensional feature space. One SDA in our deep learning model is used to learn a latent representation of the embedded vector of the function-call graph. The other SDA in our model is used to learn a latent representation of the given program's Windows API calls. The two learned latent representations are then merged to form a combined feature vector. Finally, we use softmax regression to classify the combined feature vector for predicting whether the given program is malware or not. Experimental results based on different datasets demonstrate the effectiveness of the proposed approach and its superiority over a related method. |
URL | https://ieeexplore.ieee.org/document/8614193 |
DOI | 10.1109/ICMLA.2018.00168 |
Citation Key | jiang_dlgraph:_2018 |
- Metrics
- Windows application programming interface calls
- Windows API calls
- Trojan horses
- static analysis
- stacked denoising autoencoders
- softmax regression
- SDA
- Resiliency
- representation learning
- pubcrawl
- privacy
- pattern classification
- noise reduction
- neural nets
- microsoft windows
- application program interfaces
- malware detection
- Malware Analysis
- learning (artificial intelligence)
- invasive software
- Human behavior
- graph theory
- graph embedding
- function-call graphs
- function-call graph
- feature extraction
- embedded vector
- embedded systems
- DLGraph
- deep learning
- combined feature vector classification