2022
DOI: 10.48550/arxiv.2205.03850
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

SeqNet: An Efficient Neural Network for Automatic Malware Detection

Abstract: Malware continues to evolve rapidly, and more than 450,000 new samples are captured every day, which makes manual malware analysis impractical. However, existing deep learning detection models need manual feature engineering or require high computational overhead for long training processes, which might be laborious to select feature space and difficult to retrain for mitigating model aging. Therefore, a crucial requirement for a detector is to realize automatic and efficient detection.In this paper, we propos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 28 publications
(38 reference statements)
0
2
0
Order By: Relevance
“…Recently, motivated by the recent successes in image classification domain, there has been a tendency to represent the raw malware file as a 2D image [16]- [19]. For instance, Xu et al propose the SeqNet architecture [20] which transforms the input malware into an image by introducing techniques to minimize resampling and edge losses during this conversion. Bensaud et al [21] consider malware file as a 2D image with pixel intensities byte values and learn the class of image with well-known networks such as Inception, VGG16, Resnet50.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, motivated by the recent successes in image classification domain, there has been a tendency to represent the raw malware file as a 2D image [16]- [19]. For instance, Xu et al propose the SeqNet architecture [20] which transforms the input malware into an image by introducing techniques to minimize resampling and edge losses during this conversion. Bensaud et al [21] consider malware file as a 2D image with pixel intensities byte values and learn the class of image with well-known networks such as Inception, VGG16, Resnet50.…”
Section: Related Workmentioning
confidence: 99%
“…However, since the malware is different from the image, the contextual information confusion of the malware binary may occur while visualizing it as an image. The three examples below are typical examples of contextual information confusion that can occur while converting malware into images [22].…”
Section: Malware Data Augmentationmentioning
confidence: 99%
“…Malware belonged in a specific malware family has distinguishable characteristics of malicious actions. Therefore, in order to detect malware faster and more accurately, a lot of research on malware analysis and detection based on deep learning algorithms was conducted [10][11][12][13][14][15][16][17][18][19][20][21][22]. To effectively analyze/classify the rapidly increasing number of malware, it is more effective to classify malware in detail by family or behavior than to classify benign/malicious [12,23].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, they frequently fail to keep up with the quickly expanding malware field as new and unknown malware types emerge on a regular basis [13]. As a result, there is an increasing demand for more effective and efficient malware detection classification techniques that are capable of adapting to new and unexpected malware threats [14], and [15]. We describe a novel technique for Android malware intrusion classification based on zero-shot learning with Generative Adversarial Networks (GANs) in this study.…”
Section: Introductionmentioning
confidence: 99%