Applying Convolutional Neural Network for Malware Detection
Autor: | Dan-Wei Wen, Ming-Kung Sun, Shi-Hao Wang, Chia-Mei Chen, Gu-Hsin Lai |
---|---|
Rok vydání: | 2019 |
Předmět: |
Source code
business.industry Computer science media_common.quotation_subject Shell script Deep learning 020207 software engineering 02 engineering and technology Computer security computer.software_genre Convolutional neural network 020202 computer hardware & architecture 0202 electrical engineering electronic engineering information engineering Code (cryptography) Malware The Internet Artificial intelligence Perl business computer media_common computer.programming_language |
Zdroj: | iCAST Web of Science |
DOI: | 10.1109/icawst.2019.8923568 |
Popis: | Failure to detect malware at its very inception leaves room for it to post significant threat and cost to cyber security for not only individuals, organizations but also the society and nation. However, the rapid growth in volume and diversity of malware renders conventional detection techniques that utilize feature extraction and comparison insufficient, making it very difficult for well-trained network administrators to identify malware, not to mention regular users of internet. Challenges in malware detection is exacerbated since complexity in the type and structure also increase dramatically in these years to include source code, binary file, shell script, Perl script, instructions, settings and others. Such increased complexity offers a premium on misjudgment.In order to increase malware detection efficiency and accuracy under large volume and multiple types of malware, this research adopts Convolutional Neural Networks (CNN) , one of the most successful deep learning techniques. The experiment shows an accuracy rate of over 90% in identifying malicious and benign codes. The experiment also presents that CNN is effective with detecting source code and binary code, it can further identify malware that is embedded into benign code, leaving malware no place to hide.This research proposes a feasible solution for network administrators to efficiently identify malware at the very inception in the severe network environment nowadays, so that information technology personnel can take protective actions in a timely manner and make preparations for potential follow-up cyber-attacks. |
Databáze: | OpenAIRE |
Externí odkaz: |