An Xception Convolutional Neural Network for Malware Classification with Transfer Learning
Title | An Xception Convolutional Neural Network for Malware Classification with Transfer Learning |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Lo, Wai Weng, Yang, Xu, Wang, Yapeng |
Conference Name | 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS) |
Date Published | June 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-1542-9 |
Keywords | CNN models, convolutional neural nets, convolutional neural network (CNN), ensemble model, feature extraction, Gray-scale, Human Behavior, image classification, image-based malware classification, invasive software, learning (artificial intelligence), Malware, malware classification, malware classification problem, malware image classification, Metrics, Microsoft malware dataset, pattern classification, Predictive models, privacy, pubcrawl, resilience, Resiliency, special CNN architecture, Support vector machines, Testing, Training, transfer learning, VGG16 model, Xception, Xception convolutional neural network, Xception model |
Abstract | In this work, we applied a deep Convolutional Neural Network (CNN) with Xception model to perform malware image classification. The Xception model is a recently developed special CNN architecture that is more powerful with less over- fitting problems than the current popular CNN models such as VGG16. However only a few use cases of the Xception model can be found in literature, and it has never been used to solve the malware classification problem. The performance of our approach was compared with other methods including KNN, SVM, VGG16 etc. The experiments on two datasets (Malimg and Microsoft Malware Dataset) demonstrated that the Xception model can achieve the highest training accuracy than all other approaches including the champion approach, and highest validation accuracy than all other approaches including VGG16 model which are using image-based malware classification (except the champion solution as this information was not provided). Additionally, we proposed a novel ensemble model to combine the predictions from .bytes files and .asm files, showing that a lower logloss can be achieved. Although the champion on the Microsoft Malware Dataset achieved a bit lower logloss, our approach does not require any features engineering, making it more effective to adapt to any future evolution in malware, and very much less time consuming than the champion's solution. |
URL | https://ieeexplore.ieee.org/document/8763852 |
DOI | 10.1109/NTMS.2019.8763852 |
Citation Key | lo_xception_2019 |
- Microsoft malware dataset
- Xception model
- Xception convolutional neural network
- Xception
- VGG16 model
- transfer learning
- Training
- testing
- Support vector machines
- special CNN architecture
- Resiliency
- resilience
- pubcrawl
- privacy
- Predictive models
- pattern classification
- CNN models
- Metrics
- malware image classification
- malware classification problem
- malware classification
- malware
- learning (artificial intelligence)
- invasive software
- image-based malware classification
- image classification
- Human behavior
- Gray-scale
- feature extraction
- ensemble model
- convolutional neural network (CNN)
- convolutional neural nets