Detection of unseen malware threats using generative adversarial networks and deep learning models

利用生成对抗网络和深度学习模型检测未知的恶意软件威胁

阅读:1

Abstract

The fast advancement of malware makes it an urgent problem for cybersecurity, as perpetrators consistently devise obfuscation methods to avoid detection. Conventional malware detection methods falter against polymorphic and zero-day threats, requiring more resilient and adaptable strategies. This article presents a Generative Adversarial Network (GAN)-based augmentation framework for malware detection, utilizing Convolutional Neural Networks (CNNs) to categorize malware variants efficiently. Synthetic malware images were developed using the Malevis dataset through Vanilla GAN and 4-Vanilla GAN to augment the diversity of the training dataset and enhance detection efficacy. Experimental findings indicate that training convolutional neural networks on datasets enhanced by generative adversarial networks enhances classification accuracy, with the 4-Vanilla GAN method achieving the maximum performance. Essential evaluation criteria, such as accuracy, precision, recall, FID score, Inception Score, and Diversity Score, validate the effectiveness of GAN-based augmentation. This study highlights the capability of deep learning in enhancing malware detection against new threats. Using a simplified GAN model (Dummy Generator) to create realistic grayscale malware variants from binary executables is what makes this study innovative. Furthermore, a CNN-LSTM hybrid architecture is suggested in order to capture malware patterns' sequential and spatial properties. Even with a little amount of labelled data, this combination allows for efficient categorization. Our GAN-based strategy improves dataset variety in a malware-specific environment, in contrast to traditional augmentation techniques.

特别声明

1、本页面内容包含部分的内容是基于公开信息的合理引用;引用内容仅为补充信息,不代表本站立场。

2、若认为本页面引用内容涉及侵权,请及时与本站联系,我们将第一时间处理。

3、其他媒体/个人如需使用本页面原创内容,需注明“来源:[生知库]”并获得授权;使用引用内容的,需自行联系原作者获得许可。

4、投稿及合作请联系:info@biocloudy.com。