...
首页> 外文期刊>Computers & Security >A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding
【24h】

A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding

机译:使用基于CNN的操作码嵌入和基于BPNN的API嵌入的特征混合恶意软件变体检测

获取原文
获取原文并翻译 | 示例
           

摘要

Being able to detect malware variants is a critical problem due to the potential damages and the fast paces of new malware variations. According to surveys from McAfee and Symantec, there is about 69 new instances of malware detected in every minutes, and more than 50% of them are variants of existing ones. Such a large volume of diversified malware variants has forced researches to investigate new methods based on common behavior patterns using machine learning.However, such methods only use single type of features such as opcode, system call, etc., which faces several drawbacks: Firstly, the methods lose a part of useful information since different types of features show different characteristics of malware. This severely limits detection precision and recall. Secondly, the accuracy and the speed (as a trade-off) of such methods fail to meet users' expectation. Thirdly, the precise classification of malware families is still a hard problem and is also important in malware analysis.In this work, we propose a feature-hybrid malware variants detection approach which integrates multi-types of features to address these challenges. We first represent opcodes by a bi-gram model and represent API calls by a vector of frequency, then we use principal component analysis to optimize the representations to improve the convergence speed, the next we adopt a convolutional neural network and a back-propagation neural network for opcode based feature embedding and API based feature embedding respectively, and finally we embed these features to train a detection model by using softmax.Theoretical analysis and real-life experimental results show the efficiency and optimization of our approach which achieves more than 95% malware detection accuracy and almost 90% classification accuracy of malware families. The detection speed of our approach is less than 0.1 s. (C) 2019 Elsevier Ltd. All rights reserved.
机译:能够检测恶意软件变体是由于潜在的损坏和新恶意软件变化的快速措施,这是一个关键问题。根据McAfee和Symantec的调查,每分钟检测到69个新的恶意软件实例,其中超过50%的是现有的变体。这种大量的多样化恶意软件变体已经强制研究了使用机器学习的公共行为模式来研究新方法。但是,这种方法仅使用单一类型的功能,例如Opcode,系统调用等,这面临着几个缺点:首先,该方法丢失了一部分有用信息,因为不同类型的特征显示了恶意软件的不同特征。这严重限制了检测精度和召回。其次,这些方法的准确性和速度(作为权衡)未能满足用户的期望。第三,恶意软件系列的精确分类仍然是一个难题,并且在恶意软件分析中也很重要。在此工作中,我们提出了一种特征 - 混合恶意软件变体检测方法,它集成了多种功能来解决这些挑战。我们首先代表双克模型代表OPCODE,并通过频率向量表示API调用,然后我们使用主成分分析来优化表示提高收敛速度,接下来我们采用卷积神经网络和反向传播神经网络基于操作码的特征嵌入和API基于API的特征嵌入,最后我们嵌入了这些功能来使用Softmax培训检测模型。理论分析和现实实验结果表明我们的方法的效率和优化,实现了超过95%的方法恶意软件检测准确性和Malware系列的分类准确性近90%。我们方法的检测速度小于0.1秒。 (c)2019 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号