Abstract | ||
---|---|---|
Malicious software is one of the most serious cyber threats on the Internet today. Traditional malware detection has proven unable to keep pace with the sheer number of malware because of their growing complexity, new attacks and variants. Most malware implement various metamorphic techniques in order to disguise themselves, therefore preventing successful analysis and thwarting the detection by signature-based anti-malware engines. During the past decade, there has been an increase in the research and deployment of anti-malware engines powered by machine learning, and in particular deep learning, due to their ability to handle huge volumes of malware and generalize to never-before-seen samples. However, there is little research about the vulnerability of these models to adversarial examples. To fill this gap, this paper presents an exhaustive evaluation of the state-of-the-art approaches for malware classification against common metamorphic attacks. Given the limitations found in deep learning approaches, we present a simple architecture that increases 14.95% the classification performance with respect to MalConv's architecture. Furthermore, the use of the metamorphic techniques to augment the training set is investigated and results show that it significantly improves the classification of malware belonging to families with few samples. (C) 2020 Elsevier Ltd. All rights reserved. |
Year | DOI | Venue |
---|---|---|
2021 | 10.1016/j.cose.2020.102159 | COMPUTERS & SECURITY |
Keywords | DocType | Volume |
Malware analysis, Malware classification, Software obfuscation, N-Gram extraction, Machine learning, Deep learning | Journal | 102 |
ISSN | Citations | PageRank |
0167-4048 | 0 | 0.34 |
References | Authors | |
0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Daniel Gibert | 1 | 26 | 4.29 |
Carles Mateu | 2 | 79 | 14.22 |
Jordi Planes | 3 | 486 | 31.38 |
Joao Marques-Silva | 4 | 0 | 0.34 |