Skip to main content

Design of a Fused Triple Convolutional Neural Network for Malware Detection: A Visual Classification Approach

  • Conference paper
  • First Online:
Advances in Computing and Data Sciences (ICACDS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1440))

Included in the following conference series:

Abstract

Detection of malware signatures from executable files requires effective signal processing and sandboxing operations, wherein the executable file is scanned for any malignant behavior. The recent malware detection techniques are based on static approaches that use machine and deep learning for analyzing malware signatures from byte and assembly-level program data. The byte-patterns are based on outliers, and the program-data is classified as a malware. These methods are not capable of detecting new variants of malware with long patterns of codes and huge dataset to classify the benign or malicious files. The issue with pattern analysis of large byte code dataset needs effective classification performance. To overcome these drawbacks, this paper has proposed a novel fused-triple convolutional neural network (fCNN) based framework for malware detection. This framework improves the accuracy of malware classification by converting the byte and assembly information into image data. This framework obtained more than 98% accuracy on the Microsoft Malware Dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Namanya, A.P., Cullen, A., Awan, I.U., Disso, J.P.: The world of malware: an overview. In: 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 420–427. IEEE, August 2018

    Google Scholar 

  2. Aslan, Ö.A., Samet, R.: A comprehensive review on malware detection approaches. IEEE Access 8, 6249–6271 (2020)

    Article  Google Scholar 

  3. Gibert, D., Mateu, C., Planes, J.: HYDRA: a multimodal deep learning framework for malware classification. Comput. Secur. 95, 101873 (2020)

    Article  Google Scholar 

  4. Ren, Z., Chen, G., Lu, W.: Malware visualization methods based on deep convolution neural networks. Multimedia Tools Appl. 79(15–16), 10975–10993 (2019). https://doi.org/10.1007/s11042-019-08310-9

    Article  Google Scholar 

  5. Sun, J., Luo, X., Gao, H., Wang, W., Gao, Y., Yang, X.: Categorizing malware via a Word2Vec-based temporal convolutional network scheme. J. Cloud Comput. 9(1), 1–14 (2020). https://doi.org/10.1186/s13677-020-00200-y

    Article  Google Scholar 

  6. Masabo, E., Kaawaase, K.S., Sansa-Otim, J., Ngubiri, J., Hanyurwimfura, D.: Improvement of malware classification using hybrid feature engineering. SN Comput. Sci. 1(1), 1–14 (2019). https://doi.org/10.1007/s42979-019-0017-9

    Article  Google Scholar 

  7. Gibert, D., Mateu, C., Planes, J.: The rise of machine learning for detection and classification of malware: Research developments, trends and challenges. J. Netw. Comput. Appl. 153, 102526 (2020)

    Google Scholar 

  8. Bae, S.I., Lee, G.B., Im, E.G.: Ransomware detection using machine learning algorithms. Concurr. Computat. Pract. Exp. 32(18), e5422 (2020)

    Google Scholar 

  9. Lu, J., Gu, F., Wang, Y., Chen, J., Peng, Z., Wen, S.: Static detection of file access control vulnerabilities on windows system. Concurr. Comput. Pract. Exp., e6004 (2020). https://doi.org/10.1002/cpe.6004

  10. Ahmadi, M., Ulyanov, D., Semenov, S., Trofimov, M., Giacinto, G.: Novel feature extraction, selection and fusion for effective malware family classification. In: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, pp. 183–194, March 2016

    Google Scholar 

  11. Zhang, Y., Liu, Z., Jiang, Y.: The classification and detection of malware using soft relevance evaluation. IEEE Trans. Reliab., 1–12 (2020). https://doi.org/10.1109/TR.2020.3020954

  12. Hashemi, H., Azmoodeh, A., Hamzeh, A., Hashemi, S.: Graph embedding as a new approach for unknown malware detection. J. Comput. Virol. Hacking Tech. 13(3), 153–166 (2016). https://doi.org/10.1007/s11416-016-0278-y

    Article  Google Scholar 

  13. Singh, P., Tapaswi, S., Gupta, S.: Malware detection in PDF and office documents: a survey. Inf. Secur. J. Glob. Perspect. 29(3), 134–153 (2020)

    Article  Google Scholar 

  14. Egitmen, A., Bulut, I., Aygun, R., Gunduz, A.B., Seyrekbasan, O., Yavuz, A.G.: Combat mobile evasive malware via skip-gram-based malware detection. Secur. Commun. Netw. 2020, article ID 6726147, 10 p. (2020). https://doi.org/10.1155/2020/6726147

  15. Yuan, B., Wang, J., Liu, D., Guo, W., Wu, P., Bao, X.: Byte-level malware classification based on Markov images and deep learning. Comput. Secur. 92, 101740 (2020)

    Google Scholar 

  16. Sahay, S.K., Sharma, A.: Grouping the executables to detect malware with high accuracy. arXiv preprint arXiv:1606.06908 (2016)

  17. Roseline, S.A., Geetha, S., Kadry, S., Nam, Y.: Intelligent vision-based malware detection and classification using deep random forest paradigm. IEEE Access 8, 206303–206324 (2020)

    Article  Google Scholar 

  18. Darabian, H., et al.: A multiview learning method for malware threat hunting: windows, IoT and android as case studies. World Wide Web 23(2), 1241–1260 (2020). https://doi.org/10.1007/s11280-019-00755-0

    Article  Google Scholar 

  19. Khan, R.U., Zhang, X., Kumar, R.: Analysis of ResNet and GoogleNet models for malware detection. J. Comput. Virol. Hacking Tech. 15(1), 29–37 (2018). https://doi.org/10.1007/s11416-018-0324-z

    Article  Google Scholar 

  20. Zhang, Z., Cheng, Y., Gao, Y., Nepal, S., Liu, D., Zou, Y.: Detecting hardware-assisted virtualization with inconspicuous features. IEEE Trans. Inf. Forensics Secur. 16, 16–27 (2020)

    Article  Google Scholar 

  21. Bai, J., Shi, Q., Mu, S.: A malware and variant detection method using function call graph isomorphism. Secur. Commun. Netw. 2019, article ID 1043794, 12 p. (2019). https://doi.org/10.1155/2019/1043794

  22. Gao, X., Hu, C., Shan, C., Liu, B., Niu, Z., Xie, H.: Malware classification for the cloud via semi-supervised transfer learning. J. Inf. Secur. Appl. 55, 102661 (2020)

    Google Scholar 

  23. Narouei, M., Ahmadi, M., Giacinto, G., Takabi, H., Sami, A.: DLLMiner: structural mining for malware detection. Secur. Commun. Netw. 8(18), 3311–3322 (2015)

    Article  Google Scholar 

  24. Tien, C.W., Huang, T.Y., Tien, C.W., Huang, T.C., Kuo, S.Y.: KubAnomaly: anomaly detection for the Docker orchestration platform with neural network approaches. Eng. Rep. 1(5), e12080 (2019)

    Google Scholar 

  25. Ronen, R., Radu, M., Feuerstein, C., Yom-Tov, E., Ahmadi, M.: Microsoft malware classification challenge. arXiv preprint arXiv:1802.10135 (2018)

  26. Sharma, S., Krishna, C.R., Sahay, S.K.: Detection of advanced malware by machine learning techniques. In: Ray, K., Sharma, T., Rawat, S., Saini, R., Bandyopadhyay, A. (eds.) Soft Computing: Theories and Applications. AISC, vol 742, pp. 333–342. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-0589-4_31

  27. Ding, H., Sun, W., Chen, Y., Zhao, B., Gui, H. Malware detection and classification based on parallel sequence comparison. In: 2018 5th International Conference on Systems and Informatics (ICSAI), pp. 670–675. IEEE, November 2018

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Santosh K. Smmarwar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Smmarwar, S.K., Gupta, G.P., Kumar, S. (2021). Design of a Fused Triple Convolutional Neural Network for Malware Detection: A Visual Classification Approach. In: Singh, M., Tyagi, V., Gupta, P.K., Flusser, J., Ören, T., Sonawane, V.R. (eds) Advances in Computing and Data Sciences. ICACDS 2021. Communications in Computer and Information Science, vol 1440. Springer, Cham. https://doi.org/10.1007/978-3-030-81462-5_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-81462-5_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-81461-8

  • Online ISBN: 978-3-030-81462-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics