Proceedings of the 13th International Conference on Availability, Reliability and Security 2018
DOI: 10.1145/3230833.3230835
|View full text |Cite
|
Sign up to set email alerts
|

An investigation of a deep learning based malware detection system

Abstract: We investigate a Deep Learning based system for malware detection. In the investigation, we experiment with different combination of Deep Learning architectures including Auto-Encoders, and Deep Neural Networks with varying layers over Malicia malware dataset on which earlier studies have obtained an accuracy of (98%) with an acceptable False Positive Rates (1.07%). But these results were done using extensive man-made custom domain features and investing corresponding feature engineering and design efforts. In… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 39 publications
(27 citation statements)
references
References 17 publications
(17 reference statements)
0
27
0
Order By: Relevance
“…The original opcode frequency vector of each file was preserved for comparison with that of the final obfuscated variant as produced by the ADRLMMG and the resultant de-obfuscated version of each of the obfuscated variant as produced by the DRLDO systems. We choose the IDS system (including the pre-processing, feature selection and transformation and the classification subsystems) as developed by [15][16][17] to augment it with Zero-Day-Defense 18 capabilities against metamorphic malware attack using the DRLDO system. The selected IDS had claimed to provide the best performance (with a combination of the highest accuracy accompanied with a very low false positive rates) over a standardised malware data 7 with mixed types and generation of malware.…”
Section: Training Data and Ids Usedmentioning
confidence: 99%
“…The original opcode frequency vector of each file was preserved for comparison with that of the final obfuscated variant as produced by the ADRLMMG and the resultant de-obfuscated version of each of the obfuscated variant as produced by the DRLDO systems. We choose the IDS system (including the pre-processing, feature selection and transformation and the classification subsystems) as developed by [15][16][17] to augment it with Zero-Day-Defense 18 capabilities against metamorphic malware attack using the DRLDO system. The selected IDS had claimed to provide the best performance (with a combination of the highest accuracy accompanied with a very low false positive rates) over a standardised malware data 7 with mixed types and generation of malware.…”
Section: Training Data and Ids Usedmentioning
confidence: 99%
“…Two phases are utilized in this framework, pre training and fine tuning. Various methods based on AE and DNN were proposed for malware detection in [293]. The performance f these architectures were evaluated on Malicia dataset and the proposed method performed better than the feature engineering based method.…”
Section: ) Deep Neural Network (Dnn)mentioning
confidence: 99%
“…Opcode sequences or assembly sequences are used by several researches to learn and detect malicious functionalities in the executable files [3,4,16,19].…”
Section: Assembly Sequences Extractionmentioning
confidence: 99%