Visible to the public An Xception Convolutional Neural Network for Malware Classification with Transfer Learning

TitleAn Xception Convolutional Neural Network for Malware Classification with Transfer Learning
Publication TypeConference Paper
Year of Publication2019
AuthorsLo, Wai Weng, Yang, Xu, Wang, Yapeng
Conference Name2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
Date PublishedJune 2019
PublisherIEEE
ISBN Number978-1-7281-1542-9
KeywordsCNN models, convolutional neural nets, convolutional neural network (CNN), ensemble model, feature extraction, Gray-scale, Human Behavior, image classification, image-based malware classification, invasive software, learning (artificial intelligence), Malware, malware classification, malware classification problem, malware image classification, Metrics, Microsoft malware dataset, pattern classification, Predictive models, privacy, pubcrawl, resilience, Resiliency, special CNN architecture, Support vector machines, Testing, Training, transfer learning, VGG16 model, Xception, Xception convolutional neural network, Xception model
Abstract

In this work, we applied a deep Convolutional Neural Network (CNN) with Xception model to perform malware image classification. The Xception model is a recently developed special CNN architecture that is more powerful with less over- fitting problems than the current popular CNN models such as VGG16. However only a few use cases of the Xception model can be found in literature, and it has never been used to solve the malware classification problem. The performance of our approach was compared with other methods including KNN, SVM, VGG16 etc. The experiments on two datasets (Malimg and Microsoft Malware Dataset) demonstrated that the Xception model can achieve the highest training accuracy than all other approaches including the champion approach, and highest validation accuracy than all other approaches including VGG16 model which are using image-based malware classification (except the champion solution as this information was not provided). Additionally, we proposed a novel ensemble model to combine the predictions from .bytes files and .asm files, showing that a lower logloss can be achieved. Although the champion on the Microsoft Malware Dataset achieved a bit lower logloss, our approach does not require any features engineering, making it more effective to adapt to any future evolution in malware, and very much less time consuming than the champion's solution.

URLhttps://ieeexplore.ieee.org/document/8763852
DOI10.1109/NTMS.2019.8763852
Citation Keylo_xception_2019