Cargando…
Data augmentation based malware detection using convolutional neural networks
Due to advancements in malware competencies, cyber-attacks have been broadly observed in the digital world. Cyber-attacks can hit an organization hard by causing several damages such as data breach, financial loss, and reputation loss. Some of the most prominent examples of ransomware attacks in his...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7924722/ https://www.ncbi.nlm.nih.gov/pubmed/33816996 http://dx.doi.org/10.7717/peerj-cs.346 |
_version_ | 1783659149666549760 |
---|---|
author | Catak, Ferhat Ozgur Ahmed, Javed Sahinbas, Kevser Khand, Zahid Hussain |
author_facet | Catak, Ferhat Ozgur Ahmed, Javed Sahinbas, Kevser Khand, Zahid Hussain |
author_sort | Catak, Ferhat Ozgur |
collection | PubMed |
description | Due to advancements in malware competencies, cyber-attacks have been broadly observed in the digital world. Cyber-attacks can hit an organization hard by causing several damages such as data breach, financial loss, and reputation loss. Some of the most prominent examples of ransomware attacks in history are WannaCry and Petya, which impacted companies’ finances throughout the globe. Both WannaCry and Petya caused operational processes inoperable by targeting critical infrastructure. It is quite impossible for anti-virus applications using traditional signature-based methods to detect this type of malware because they have different characteristics on each contaminated computer. The most important feature of this type of malware is that they change their contents using their mutation engines to create another hash representation of the executable file as they propagate from one computer to another. To overcome this method that attackers use to camouflage malware, we have created three-channel image files of malicious software. Attackers make different variants of the same software because they modify the contents of the malware. In the solution to this problem, we created variants of the images by applying data augmentation methods. This article aims to provide an image augmentation enhanced deep convolutional neural network (CNN) models for detecting malware families in a metamorphic malware environment. The main contributions of the article consist of three components, including image generation from malware samples, image augmentation, and the last one is classifying the malware families by using a CNN model. In the first component, the collected malware samples are converted into binary file to 3-channel images using the windowing technique. The second component of the system create the augmented version of the images, and the last part builds a classification model. This study uses five different deep CNN model for malware family detection. The results obtained by the classifier demonstrate accuracy up to 98%, which is quite satisfactory. |
format | Online Article Text |
id | pubmed-7924722 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-79247222021-04-02 Data augmentation based malware detection using convolutional neural networks Catak, Ferhat Ozgur Ahmed, Javed Sahinbas, Kevser Khand, Zahid Hussain PeerJ Comput Sci Artificial Intelligence Due to advancements in malware competencies, cyber-attacks have been broadly observed in the digital world. Cyber-attacks can hit an organization hard by causing several damages such as data breach, financial loss, and reputation loss. Some of the most prominent examples of ransomware attacks in history are WannaCry and Petya, which impacted companies’ finances throughout the globe. Both WannaCry and Petya caused operational processes inoperable by targeting critical infrastructure. It is quite impossible for anti-virus applications using traditional signature-based methods to detect this type of malware because they have different characteristics on each contaminated computer. The most important feature of this type of malware is that they change their contents using their mutation engines to create another hash representation of the executable file as they propagate from one computer to another. To overcome this method that attackers use to camouflage malware, we have created three-channel image files of malicious software. Attackers make different variants of the same software because they modify the contents of the malware. In the solution to this problem, we created variants of the images by applying data augmentation methods. This article aims to provide an image augmentation enhanced deep convolutional neural network (CNN) models for detecting malware families in a metamorphic malware environment. The main contributions of the article consist of three components, including image generation from malware samples, image augmentation, and the last one is classifying the malware families by using a CNN model. In the first component, the collected malware samples are converted into binary file to 3-channel images using the windowing technique. The second component of the system create the augmented version of the images, and the last part builds a classification model. This study uses five different deep CNN model for malware family detection. The results obtained by the classifier demonstrate accuracy up to 98%, which is quite satisfactory. PeerJ Inc. 2021-01-22 /pmc/articles/PMC7924722/ /pubmed/33816996 http://dx.doi.org/10.7717/peerj-cs.346 Text en © 2021 Catak et al. https://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Artificial Intelligence Catak, Ferhat Ozgur Ahmed, Javed Sahinbas, Kevser Khand, Zahid Hussain Data augmentation based malware detection using convolutional neural networks |
title | Data augmentation based malware detection using convolutional neural networks |
title_full | Data augmentation based malware detection using convolutional neural networks |
title_fullStr | Data augmentation based malware detection using convolutional neural networks |
title_full_unstemmed | Data augmentation based malware detection using convolutional neural networks |
title_short | Data augmentation based malware detection using convolutional neural networks |
title_sort | data augmentation based malware detection using convolutional neural networks |
topic | Artificial Intelligence |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7924722/ https://www.ncbi.nlm.nih.gov/pubmed/33816996 http://dx.doi.org/10.7717/peerj-cs.346 |
work_keys_str_mv | AT catakferhatozgur dataaugmentationbasedmalwaredetectionusingconvolutionalneuralnetworks AT ahmedjaved dataaugmentationbasedmalwaredetectionusingconvolutionalneuralnetworks AT sahinbaskevser dataaugmentationbasedmalwaredetectionusingconvolutionalneuralnetworks AT khandzahidhussain dataaugmentationbasedmalwaredetectionusingconvolutionalneuralnetworks |