Cargando…

Performance evaluation of deep neural network on malware detection: visual feature approach

Nowadays, several malicious applications target computers and mobile users. So, malware detection plays a vital role on the internet so that the device is secure without any malicious activity affecting or gathering the useful content of the user. Researches indicate that the vulnerability of advers...

Descripción completa

Detalles Bibliográficos
Autores principales: Anandhi, V., Vinod, P., Menon, Varun G., Aditya, Korankotte Manoj
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer US 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9387895/
https://www.ncbi.nlm.nih.gov/pubmed/35999895
http://dx.doi.org/10.1007/s10586-022-03702-3
_version_ 1784770104132632576
author Anandhi, V.
Vinod, P.
Menon, Varun G.
Aditya, Korankotte Manoj
author_facet Anandhi, V.
Vinod, P.
Menon, Varun G.
Aditya, Korankotte Manoj
author_sort Anandhi, V.
collection PubMed
description Nowadays, several malicious applications target computers and mobile users. So, malware detection plays a vital role on the internet so that the device is secure without any malicious activity affecting or gathering the useful content of the user. Researches indicate that the vulnerability of adversarial attacks is more in deep neural networks. When there is a malicious sample in a family, there will not be many changes in the variants, but there will be more signatures. So, a deep learning model, DenseNet was used for detection. The adversarial samples are created by other types of noise, including the Gaussian noise. We added this noise to a subset of malware samples and observed that for Malimg, the modified samples were precisely identified by the DenseNet, and the attack cannot be done. But for BIG2015, we found that there was some marginal decrease in the performance of the classifier, which shows that the model performs well. Further, experiments on the Fast Gradient Sign Method (FGSM) were conducted, and it was observed that a significant decrease in classification accuracy was detected for both datasets. We understand that deep learning models should be robust to adversarial attacks.
format Online
Article
Text
id pubmed-9387895
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Springer US
record_format MEDLINE/PubMed
spelling pubmed-93878952022-08-19 Performance evaluation of deep neural network on malware detection: visual feature approach Anandhi, V. Vinod, P. Menon, Varun G. Aditya, Korankotte Manoj Cluster Comput Article Nowadays, several malicious applications target computers and mobile users. So, malware detection plays a vital role on the internet so that the device is secure without any malicious activity affecting or gathering the useful content of the user. Researches indicate that the vulnerability of adversarial attacks is more in deep neural networks. When there is a malicious sample in a family, there will not be many changes in the variants, but there will be more signatures. So, a deep learning model, DenseNet was used for detection. The adversarial samples are created by other types of noise, including the Gaussian noise. We added this noise to a subset of malware samples and observed that for Malimg, the modified samples were precisely identified by the DenseNet, and the attack cannot be done. But for BIG2015, we found that there was some marginal decrease in the performance of the classifier, which shows that the model performs well. Further, experiments on the Fast Gradient Sign Method (FGSM) were conducted, and it was observed that a significant decrease in classification accuracy was detected for both datasets. We understand that deep learning models should be robust to adversarial attacks. Springer US 2022-08-18 2022 /pmc/articles/PMC9387895/ /pubmed/35999895 http://dx.doi.org/10.1007/s10586-022-03702-3 Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022, Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Anandhi, V.
Vinod, P.
Menon, Varun G.
Aditya, Korankotte Manoj
Performance evaluation of deep neural network on malware detection: visual feature approach
title Performance evaluation of deep neural network on malware detection: visual feature approach
title_full Performance evaluation of deep neural network on malware detection: visual feature approach
title_fullStr Performance evaluation of deep neural network on malware detection: visual feature approach
title_full_unstemmed Performance evaluation of deep neural network on malware detection: visual feature approach
title_short Performance evaluation of deep neural network on malware detection: visual feature approach
title_sort performance evaluation of deep neural network on malware detection: visual feature approach
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9387895/
https://www.ncbi.nlm.nih.gov/pubmed/35999895
http://dx.doi.org/10.1007/s10586-022-03702-3
work_keys_str_mv AT anandhiv performanceevaluationofdeepneuralnetworkonmalwaredetectionvisualfeatureapproach
AT vinodp performanceevaluationofdeepneuralnetworkonmalwaredetectionvisualfeatureapproach
AT menonvarung performanceevaluationofdeepneuralnetworkonmalwaredetectionvisualfeatureapproach
AT adityakorankottemanoj performanceevaluationofdeepneuralnetworkonmalwaredetectionvisualfeatureapproach