...
首页> 外文期刊>Computers & Security >A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding
【24h】

A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding

机译:使用基于CNN的操作码嵌入和基于BPNN的API嵌入进行功能混合的恶意软件变体检测

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Being able to detect malware variants is a critical problem due to the potential damages and the fast paces of new malware variations. According to surveys from McAfee and Symantec, there is about 69 new instances of malware detected in every minutes, and more than 50% of them are variants of existing ones. Such a large volume of diversified malware variants has forced researches to investigate new methods based on common behavior patterns using machine learning.However, such methods only use single type of features such as opcode, system call, etc., which faces several drawbacks: Firstly, the methods lose a part of useful information since different types of features show different characteristics of malware. This severely limits detection precision and recall. Secondly, the accuracy and the speed (as a trade-off) of such methods fail to meet users' expectation. Thirdly, the precise classification of malware families is still a hard problem and is also important in malware analysis.In this work, we propose a feature-hybrid malware variants detection approach which integrates multi-types of features to address these challenges. We first represent opcodes by a bi-gram model and represent API calls by a vector of frequency, then we use principal component analysis to optimize the representations to improve the convergence speed, the next we adopt a convolutional neural network and a back-propagation neural network for opcode based feature embedding and API based feature embedding respectively, and finally we embed these features to train a detection model by using softmax.Theoretical analysis and real-life experimental results show the efficiency and optimization of our approach which achieves more than 95% malware detection accuracy and almost 90% classification accuracy of malware families. The detection speed of our approach is less than 0.1 s. (C) 2019 Elsevier Ltd. All rights reserved.
机译:由于潜在的损害和新的恶意软件变种的快速发展,能够检测到恶意软件变种是一个关键问题。根据McAfee和Symantec的调查,每分钟大约检测到69个新的恶意软件实例,其中超过50%是现有恶意软件的变体。如此大量多样的恶意软件变种迫使研究人员使用机器学习基于常见行为模式研究新方法,但是这些方法仅使用单一类型的功能(例如操作码,系统调用等),因此面临以下几个缺点: ,这些方法会丢失部分有用的信息,因为不同类型的功能会显示出不同的恶意软件特征。这严重限制了检测精度和召回率。其次,这种方法的准确性和速度(作为一种折衷)不能满足用户的期望。第三,对恶意软件家族进行精确分类仍然是一个难题,并且在恶意软件分析中也很重要。在这项工作中,我们提出了一种功能混合型恶意软件变种检测方法,该方法集成了多种类型的功能以应对这些挑战。我们首先通过一个二元模型模型来表示操作码,并通过一个频率向量来表示API调用,然后我们使用主成分分析来优化表示形式以提高收敛速度,然后我们使用一个卷积神经网络和一个反向传播神经元。网络分别用于基于操作码的特征嵌入和基于API的特征嵌入,最后我们使用softmax嵌入这些特征以训练检测模型。理论分析和实际实验结果表明,该方法的效率和优化效果均达到95%以上恶意软件检测准确度和恶意软件家族的分类准确率几乎达到90%。我们的方法的检测速度小于0.1 s。 (C)2019 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号