Cargando…

Data augmentation based malware detection using convolutional neural networks

Due to advancements in malware competencies, cyber-attacks have been broadly observed in the digital world. Cyber-attacks can hit an organization hard by causing several damages such as data breach, financial loss, and reputation loss. Some of the most prominent examples of ransomware attacks in his...

Descripción completa

Detalles Bibliográficos
Autores principales: Catak, Ferhat Ozgur, Ahmed, Javed, Sahinbas, Kevser, Khand, Zahid Hussain
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7924722/
https://www.ncbi.nlm.nih.gov/pubmed/33816996
http://dx.doi.org/10.7717/peerj-cs.346
_version_ 1783659149666549760
author Catak, Ferhat Ozgur
Ahmed, Javed
Sahinbas, Kevser
Khand, Zahid Hussain
author_facet Catak, Ferhat Ozgur
Ahmed, Javed
Sahinbas, Kevser
Khand, Zahid Hussain
author_sort Catak, Ferhat Ozgur
collection PubMed
description Due to advancements in malware competencies, cyber-attacks have been broadly observed in the digital world. Cyber-attacks can hit an organization hard by causing several damages such as data breach, financial loss, and reputation loss. Some of the most prominent examples of ransomware attacks in history are WannaCry and Petya, which impacted companies’ finances throughout the globe. Both WannaCry and Petya caused operational processes inoperable by targeting critical infrastructure. It is quite impossible for anti-virus applications using traditional signature-based methods to detect this type of malware because they have different characteristics on each contaminated computer. The most important feature of this type of malware is that they change their contents using their mutation engines to create another hash representation of the executable file as they propagate from one computer to another. To overcome this method that attackers use to camouflage malware, we have created three-channel image files of malicious software. Attackers make different variants of the same software because they modify the contents of the malware. In the solution to this problem, we created variants of the images by applying data augmentation methods. This article aims to provide an image augmentation enhanced deep convolutional neural network (CNN) models for detecting malware families in a metamorphic malware environment. The main contributions of the article consist of three components, including image generation from malware samples, image augmentation, and the last one is classifying the malware families by using a CNN model. In the first component, the collected malware samples are converted into binary file to 3-channel images using the windowing technique. The second component of the system create the augmented version of the images, and the last part builds a classification model. This study uses five different deep CNN model for malware family detection. The results obtained by the classifier demonstrate accuracy up to 98%, which is quite satisfactory.
format Online
Article
Text
id pubmed-7924722
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-79247222021-04-02 Data augmentation based malware detection using convolutional neural networks Catak, Ferhat Ozgur Ahmed, Javed Sahinbas, Kevser Khand, Zahid Hussain PeerJ Comput Sci Artificial Intelligence Due to advancements in malware competencies, cyber-attacks have been broadly observed in the digital world. Cyber-attacks can hit an organization hard by causing several damages such as data breach, financial loss, and reputation loss. Some of the most prominent examples of ransomware attacks in history are WannaCry and Petya, which impacted companies’ finances throughout the globe. Both WannaCry and Petya caused operational processes inoperable by targeting critical infrastructure. It is quite impossible for anti-virus applications using traditional signature-based methods to detect this type of malware because they have different characteristics on each contaminated computer. The most important feature of this type of malware is that they change their contents using their mutation engines to create another hash representation of the executable file as they propagate from one computer to another. To overcome this method that attackers use to camouflage malware, we have created three-channel image files of malicious software. Attackers make different variants of the same software because they modify the contents of the malware. In the solution to this problem, we created variants of the images by applying data augmentation methods. This article aims to provide an image augmentation enhanced deep convolutional neural network (CNN) models for detecting malware families in a metamorphic malware environment. The main contributions of the article consist of three components, including image generation from malware samples, image augmentation, and the last one is classifying the malware families by using a CNN model. In the first component, the collected malware samples are converted into binary file to 3-channel images using the windowing technique. The second component of the system create the augmented version of the images, and the last part builds a classification model. This study uses five different deep CNN model for malware family detection. The results obtained by the classifier demonstrate accuracy up to 98%, which is quite satisfactory. PeerJ Inc. 2021-01-22 /pmc/articles/PMC7924722/ /pubmed/33816996 http://dx.doi.org/10.7717/peerj-cs.346 Text en © 2021 Catak et al. https://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Artificial Intelligence
Catak, Ferhat Ozgur
Ahmed, Javed
Sahinbas, Kevser
Khand, Zahid Hussain
Data augmentation based malware detection using convolutional neural networks
title Data augmentation based malware detection using convolutional neural networks
title_full Data augmentation based malware detection using convolutional neural networks
title_fullStr Data augmentation based malware detection using convolutional neural networks
title_full_unstemmed Data augmentation based malware detection using convolutional neural networks
title_short Data augmentation based malware detection using convolutional neural networks
title_sort data augmentation based malware detection using convolutional neural networks
topic Artificial Intelligence
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7924722/
https://www.ncbi.nlm.nih.gov/pubmed/33816996
http://dx.doi.org/10.7717/peerj-cs.346
work_keys_str_mv AT catakferhatozgur dataaugmentationbasedmalwaredetectionusingconvolutionalneuralnetworks
AT ahmedjaved dataaugmentationbasedmalwaredetectionusingconvolutionalneuralnetworks
AT sahinbaskevser dataaugmentationbasedmalwaredetectionusingconvolutionalneuralnetworks
AT khandzahidhussain dataaugmentationbasedmalwaredetectionusingconvolutionalneuralnetworks