2021
DOI: 10.48550/arxiv.2110.13409
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware

Abstract: Malware authors apply different obfuscation techniques on the generic feature of malware (i.e., unique malware signature) to create new variants to avoid detection. Existing Siamese Neural Network (SNN) based malware detection methods fail to correctly classify different malware families when similar generic features are shared across multiple malware variants resulting in high false-positive rates. To address this issue, we propose a novel Task-Aware Meta Learning-based Siamese Neural Network resilient agains… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 39 publications
0
7
0
Order By: Relevance
“…In our future work, we will extend this model for the multi-class scenarios to detect different classes of intrusion attacks specifically minority attacks. We also plan to apply the proposed method for Android-based malware detection [57,58], or ransomware detection and classification tasks [59,60,61] to evaluate the generalizability and practicability.…”
Section: Discussionmentioning
confidence: 99%
“…In our future work, we will extend this model for the multi-class scenarios to detect different classes of intrusion attacks specifically minority attacks. We also plan to apply the proposed method for Android-based malware detection [57,58], or ransomware detection and classification tasks [59,60,61] to evaluate the generalizability and practicability.…”
Section: Discussionmentioning
confidence: 99%
“…By using entropy features, our model is more resilient to producing misclassification when obfuscated malware is included in training samples. Though the resilience against the control flow obfuscation technique has been evidenced in [25], the influence of other types of obfuscation techniques requires further investigation.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…More changes to the original information content produce higher entropy values while fewer changes to the original information are associated with lower entropy values. As discussed in [24,25], using entropy values as feature representation has a number of advantages compared to using grayscale 1 ImageNet. http://www.image-net.org image features.…”
Section: Feature Preprocessing Phasementioning
confidence: 99%
See 1 more Smart Citation
“…2) Malware classification. A meta-learning algorithm [37] and two-dimensional image processing techniques [38] have been proposed for obfuscated malware classification. One of the current issues is timely reconstruction of up-to-date malware datasets [14], ML models [16], and classifiers [17] to keep up with evolving malware such as XLoader.…”
Section: Related Workmentioning
confidence: 99%