Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.1.197

Visualized Malware Classification Based-on Convolutional Neural Network  

Seok, Seonhee (Pusan National University)
Kim, Howon (Pusan National University)
Abstract
In this paper, we propose a method based on a convolutional neural network which is one of the deep neural network. So, we convert a malware code to malware image and train the convolutional neural network. In experiment with classify 9-families, the proposed method records a 96.2%, 98.7% of top-1, 2 error rate. And our model can classify 27 families with 82.9%, 89% of top-1,2 error rate.
Keywords
Malware Classification; Malware Image; Convolutional Neural Network;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 A. Test, "Malware Statistics." https://www.av-test.org/en/statistics/malware//, 2015. [Online; accessed 22-September-2015].
2 K. S. Han, B. Kang, and E. G. Im, "Malware classification using instruction frequencies," in Proceedings of the 2011 ACM Symposium on Research in Applied Computation, RACS '11, (New York, NY, USA), pp. 298-300, ACM, 2011.
3 J. Kinable and O. Kostakis, "Malware classication based on call graph clustering," Journal in Computer Virology, vol. 7, no. 4, pp. 233-245, 2011.   DOI
4 M. Islam, R. Tian, L. Batten, and S. Versteeg, "Classication of malware based on string and function feature selection," in Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second, pp. 9-17, July 2010.
5 R. Tian, L. Batten, and S. Versteeg, "Function length as a tool for malware classication," in Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on, pp. 69-76, Oct 2008.
6 M. Bailey, J. Oberheide, J. Andersen, Z. Mao, F. Jahanian, and J. Nazario, "Automated classification and analysis of internet malware," in Recent Advances in Intrusion Detection (C. Kruegel, R. Lippmann, and A. Clark, eds.), vol. 4637 of Lecture Notes in Computer Science, pp. 178-197, Springer, 2007.
7 M. Zolkipli and A. Jantan, "An approach for malware behavior identification and classification," in Computer Research and Development (ICCRD), 2011 3rd International Conference on, vol. 1, pp. 191-194, March 2011.
8 R. Islam, R. Tian, L. M. Batten, and S. Versteeg, "Classification of malware based on integrated static and dynamic features," Journal of Network and Computer Applications, vol. 36, no. 2, pp. 646-656, 2013.   DOI
9 H. Seo, J. Choi, and P. Chu, "A Study on Windows Malicious Code Classification System", Journal of the Korea Society for Simulation, vol. 18, no. 1, pp. 63-70, 2009.
10 R. Pascanu, J. Stokes, H. Sanossian, M. Marinescu, and A. Thomas, "Malware classification with recurrent networks," in Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on, pp. 1916-1920, April 2015.
11 W. Jung, S. Kim, and S. Choi, "Poster: Deep learning for zero-day ash malware detection," 2015.
12 L. Nataraj, V. Yegneswaran, P. Porras, and J. Zhang, "A comparative assessment of malware classication using binary texture analysis and dynamic analysis," in Proceedings of the 4th ACM Workshop on Security and Articial Intelligence, AISec '11, (New York, NY, USA), pp. 21-30, ACM, 2011.
13 A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classication with deep convolutional neural networks," in Advances in neural information processing systems, pp. 1097-1105, 2012.
14 Microsoft, "Microsoft malware classication challenge (big 2015)," 2015-02-03. [Online; accessed 2-July-2015]
15 VX Heaven, "Vx heaven virus collection 2010-05-18." http://vxheaven.org/. [Online; accessed 18-May-2015].
16 virustotal, "VirusTotal." https://www.virustotal.com/. [Online; accessed 04-Nov ember-2015].
17 M. Sokolova and G. Lapalme, "A systematic analysis of performance measures for classication tasks," Information Processing & Management, vol. 45, no. 4,pp. 427-437, 2009.   DOI
18 L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath, "Malware images: Visualization and automatic classication," in Proceedings of the 8th International Symposium on Visualization for Cyber Security, VizSec '11, (New York,NY, USA), pp. 4:1-4:7, ACM, 2011.
19 K. Rieck, T. Holz, C. Willems, P. Dussel, and P. Laskov, "Learning and classification of malware behavior," in Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 108-125, Springer, 2008.
20 B. Han, Y. Choi, and B. Bae, "Generating Malware DNA to Classify the Similar Malwares" Journal of the Korea Institute of Information Security and Cryptology, vol. 23, pp. 679-694, 2013.   DOI