Visible to the public Applying Convolutional Neural Network for Malware Detection

TitleApplying Convolutional Neural Network for Malware Detection
Publication TypeConference Paper
Year of Publication2019
AuthorsChen, Chia-Mei, Wang, Shi-Hao, Wen, Dan-Wei, Lai, Gu-Hsin, Sun, Ming-Kung
Conference Name2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)
Date Publishedoct
PublisherIEEE
ISBN Number978-1-7281-3821-3
Keywordsbinary code analysis, composability, computer network security, convolutional neural nets, convolutional neural networks, Convolutional Neural Networks (CNN), cyber physical systems, Deep Learning, feature extraction, Internet, invasive software, knowledge based systems, learning (artificial intelligence), machine learning, Malware, malware detection, malware detection efficiency, malware renders conventional detection techniques, Metrics, network administrators, network coding, Personnel, Predictive models, pubcrawl, resilience, Resiliency, source code, Source code analysis, Testing, Training
Abstract

Failure to detect malware at its very inception leaves room for it to post significant threat and cost to cyber security for not only individuals, organizations but also the society and nation. However, the rapid growth in volume and diversity of malware renders conventional detection techniques that utilize feature extraction and comparison insufficient, making it very difficult for well-trained network administrators to identify malware, not to mention regular users of internet. Challenges in malware detection is exacerbated since complexity in the type and structure also increase dramatically in these years to include source code, binary file, shell script, Perl script, instructions, settings and others. Such increased complexity offers a premium on misjudgment. In order to increase malware detection efficiency and accuracy under large volume and multiple types of malware, this research adopts Convolutional Neural Networks (CNN), one of the most successful deep learning techniques. The experiment shows an accuracy rate of over 90% in identifying malicious and benign codes. The experiment also presents that CNN is effective with detecting source code and binary code, it can further identify malware that is embedded into benign code, leaving malware no place to hide. This research proposes a feasible solution for network administrators to efficiently identify malware at the very inception in the severe network environment nowadays, so that information technology personnel can take protective actions in a timely manner and make preparations for potential follow-up cyber-attacks.

URLhttps://ieeexplore.ieee.org/document/8923568
DOI10.1109/ICAwST.2019.8923568
Citation Keychen_applying_2019