- Title
- A novel machine learning approach for detecting first-time-appeared malware
- Creator
- Shaukat, Kamran; Luo, Suhuai; Varadharajan, Vijay
- Relation
- Engineering Applications of Artificial Intelligence Vol. 131, no. 107801
- Publisher Link
- http://dx.doi.org/10.1016/j.engappai.2023.107801
- Publisher
- Elsevier
- Resource Type
- journal article
- Date
- 2024
- Description
- Conventional malware detection approaches have the overhead of feature extraction, the requirement of domain experts, and are time-consuming and resource-intensive. Learning-based approaches are the mainstay of malware detection as they overcome most of these challenges by significantly improving the detection effectiveness and providing a low false positive rate. The exponential growth of malware variants and first-time-appeared malware, which includes polymorphic and zero-day attacks, are some of the significant challenges to learning-based malware detectors. These challenges have catastrophic impacts on the detection effectiveness of these learning-based malware detectors. This paper proposes a novel deep learning-based framework to detect first-time-appeared malware effectively and efficiently by providing better performance than conventional malware detection approaches. First, it translates and visualises each Windows portable executable (PE) file into a coloured image to eliminate the overhead of feature extraction and the need for domain experts to analyse the features. In the subsequent step, a fine-tuned deep learning model is used to extract the deep features from the last fully connected layer. The step has reduced the cost of training required by the deep learning models if used for end-to-end classification. The third step selects the most important and influential features through a powerful feature selection algorithm. The most important features are then fed to a one-class classifier for final detection. With the one-class classifier, an enclosed boundary around the features of benign data is constructed. Anything outside the boundary is declared as an anomaly/malicious. It has enhanced the framework's ability to detect evolving, unseen, polymorphic, and zero-day attacks, as well as reducing the problem of overfitting. The detection effectiveness of the proposed framework is validated with state-of-the-art deep learning models and conventional approaches. The proposed framework has outperformed with an accuracy of 99.30% on the Malimg dataset. The Wilcoxon signed-rank test is used to validate the statistical significance of the proposed framework. It is evident from the results that the proposed framework is effective and can be used in the defence industry, resulting in more powerful and robust solutions against zero-day and polymorphic attacks.
- Subject
- deep learning; machine learning; artificial intelligence; zero-day malware; polymorphic; malware
- Identifier
- http://hdl.handle.net/1959.13/1505895
- Identifier
- uon:55769
- Identifier
- ISSN:0952-1976
- Rights
- x
- Language
- eng
- Reviewed
- Hits: 1068
- Visitors: 1065
- Downloads: 0