Malware detection and classification using embedded convolutional neural network and long short-term memory technique

Theophilus Aniemeka Enem, Olalekan J. Awujoola
{"title":"Malware detection and classification using embedded convolutional neural network and long short-term memory technique","authors":"Theophilus Aniemeka Enem, Olalekan J. Awujoola","doi":"10.4314/swj.v18i2.6","DOIUrl":null,"url":null,"abstract":"The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks. As the use of encryption protocols increases, so does the challenge of identifying malware encrypted traffic also increases. Malware is a threat to people in the cyber world, as it steals personal information and harms computer systems. Network attacks refer to all types of unauthorized access to a network, including any attempts to damage and disrupt the network. This often leads to serious consequences. However, various researchers, developers and information security specialists around the globe continuously work on strategies for detecting malware. Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs, such as using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) to classify malicious traffic. But, with the diverse nature of malware, it is difficult to extract features from it. Therefore, existing solutions require more computing resources since available resources are not efficient for datasets with large numbers of samples. Also, adopting existing feature extractors for extracting features of images consumes more resources. This paper therefore solved these problems by combining a 1D convolutional neural network (CNN) and long short-term memory (LSTM) to adequately detect and classify malicious encrypted traffic. This work was conducted on the malware Analysis benchmark Datasets with API Call Sequences, which contains 42,797 malwares and 1,079 goodware API call sequences. The experimental results show that our proposed system has achieved 99.2% accuracy and outperformed all other state-of-the-art models.","PeriodicalId":21583,"journal":{"name":"Science World Journal","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Science World Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4314/swj.v18i2.6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks. As the use of encryption protocols increases, so does the challenge of identifying malware encrypted traffic also increases. Malware is a threat to people in the cyber world, as it steals personal information and harms computer systems. Network attacks refer to all types of unauthorized access to a network, including any attempts to damage and disrupt the network. This often leads to serious consequences. However, various researchers, developers and information security specialists around the globe continuously work on strategies for detecting malware. Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs, such as using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) to classify malicious traffic. But, with the diverse nature of malware, it is difficult to extract features from it. Therefore, existing solutions require more computing resources since available resources are not efficient for datasets with large numbers of samples. Also, adopting existing feature extractors for extracting features of images consumes more resources. This paper therefore solved these problems by combining a 1D convolutional neural network (CNN) and long short-term memory (LSTM) to adequately detect and classify malicious encrypted traffic. This work was conducted on the malware Analysis benchmark Datasets with API Call Sequences, which contains 42,797 malwares and 1,079 goodware API call sequences. The experimental results show that our proposed system has achieved 99.2% accuracy and outperformed all other state-of-the-art models.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于嵌入式卷积神经网络和长短期记忆技术的恶意软件检测与分类
互联网使用的显著增长和网络技术的快速发展与网络攻击风险的增加有关。随着加密协议使用的增加,识别恶意软件加密流量的挑战也在增加。恶意软件对网络世界的人们来说是一种威胁,因为它窃取个人信息并损害计算机系统。网络攻击是指对网络的各种未经授权的访问,包括任何破坏和破坏网络的企图。这往往会导致严重的后果。然而,全球各地的各种研究人员、开发人员和信息安全专家不断致力于检测恶意软件的策略。近年来,深度学习已成功应用于网络安全评估和入侵检测系统,并取得了诸多突破,例如利用卷积神经网络(CNN)和长短期记忆(LSTM)对恶意流量进行分类。但是,由于恶意软件的多样性,很难从中提取特征。因此,现有的解决方案需要更多的计算资源,因为可用的资源对于大量样本的数据集来说效率不高。同时,采用现有的特征提取器提取图像的特征会消耗更多的资源。因此,本文通过将一维卷积神经网络(CNN)与长短期记忆(LSTM)相结合来充分检测和分类恶意加密流量,从而解决了这些问题。这项工作是在带有API调用序列的恶意软件分析基准数据集上进行的,其中包含42,797个恶意软件和1,079个良好的软件API调用序列。实验结果表明,我们提出的系统达到了99.2%的准确率,优于所有其他最先进的模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Ecological observations of freshwater snails in the vicinity of an artificial lake Insights into folic acid mixtures compounded with commercially available vitamin syrups Linkages between economic growth, health expenditures, education, and environment: dynamic analysis of Nigeria Biosurfactant production potentials of microorganisms isolated from atmosphere of five petroleum stations at Tanke, Ilorin, Kwara State, Nigeria Biodegradation of bonny light crude oil by plasmid and non-plasmid borne soil bacterial strains using biostimulation and bioaugmentation techniques
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1