Abstract
As the Internet rapidly develops, the types and quantity of malware continue to diversify and increase, and the technology of evading security software is becoming more and more advanced. This paper proposes a malware detection method based on deep learning, which combines malware visualization technology with convolutional neural network. The structure of neural network is based on VGG16 network. This paper proposes the hybrid visualization of malware, combining static and dynamic analysis. In hybrid visualization, we use the Cuckoo Sandbox to carry out dynamic analysis on the samples, convert the dynamic analysis results into a visualization image according to a designed algorithm, and train the neural network on static and hybrid visualization images. Finally, we test the performance of the malware detection method we propose, evaluating its effectiveness on detecting unknown malware.





Similar content being viewed by others
References
Damodaran, A., Di Troia, F., Visaggio, C. A., Austin, T. H., & Stamp, M. (2017). A comparison of static, dynamic, and hybrid analysis for malware detection. Journal of Computer Virology and Hacking Techniques, 13(1), 1–12.
Alazab, M., Venkataraman, S., Watters, P. (2010, July). Towards understanding malware behaviour by the extraction of API calls. In 2010 Second Cybercrime and Trustworthy Computing Workshop (pp. 52-59). IEEE.
Ye, Y., Li, T., Adjeroh, D., & Iyengar, S. S. (2017). A survey on malware detection using data mining techniques. ACM Computing Surveys (CSUR), 50(3), 1–40.
Zhang, F. (2003). Implementation Technology and Research on Unknown Virus Detection Method and System (Master’s thesis). Northwestern Polytechnical University, Xi’an, Shaanxi Province, China.
Lu, Z. (2013). A Study of Static Malicious Code Detection Method Based on Opcode Sequneces (Master’s thesis). Harbin: Harbin Institute of Technology.
Ravi, C., & Manoharan, R. (2012). Malware detection using windows api sequence and machine learning. International Journal of Computer Applications, 43(17), 12–16.
Zhang, R., & Yang, J. (2014). Android malware detection based on permission correlation. Journal of Computer Applications, 34(5), 1322–1325.
Yang, P., Zhao, B., & Shu, H. (2019). Malicious code detection method based on icon similarity analysis. Journal of Computer Applications, 39(06), 1728–1734.
Qiu, H., Qiu, M., & Lu, Z. (2020). Selective encryption on ecg data in body sensor network based on supervised machine learning. Information Fusion, 55, 59–67.
Qiu, H., Noura, H., Qiu, M., Ming, Z., Memmi, G. (2019). A user-centric data protection method for cloud storage based on invertible DWT. IEEE Transactions on Cloud Computing
Li, Z., Zou, D., Xu, S., Ou, X., Jin, H., Wang, S., ... & Zhong, Y. (2018). Vuldeepecker: A deep learning-based system for vulnerability detection. Paper presented at 25th Annual Network and Distributed System Security Symposium (NDSS 2018), San Diego, California, USA, 18–21 February 2018.
Qiu, H., Zheng, Q., Memmi, G., Lu, J., Qiu, M., & Thuraisingham, B. (2020). Deep residual learning based enhanced JPEG compression in the internet of things. IEEE Transactions on Industrial Informatics., 1.
Nataraj, L., Karthikeyan, S., Jacob, G., & Manjunath, B. S. (2011, July). Malware images: Visualization and automatic classification. In Proceedings of the 8th international symposium on visualization for cyber security (pp. 1-7).
Kalash, M., Rochan, M., Mohammed, N., Bruce, N. D., Wang, Y., Iqbal, F. (2018, February). Malware classification with deep convolutional neural networks. In 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) (pp. 1-5). IEEE.
Li, Y. (2018). Detection of Malicious Software Based on Data Visualization (Master’s thesis). In Xidian University, Xi’an. Shaanxi Province: China.
Xia, X. (2018). Research on Android Malware Detection Method Based on Image and Text Feature with Deep Learning (Master’s thesis). Harbin Institute of Technology, Harbin.
Fu, J., Xue, J., Wang, Y., Liu, Z., & Shan, C. (2018). Malware visualization for fine-grained classification. IEEE Access, 6, 14510–14523.
Shaid, S, Z, M., & Maarof, M, A. (2014, August). Malware behavior image for malware variant identification. In 2014 International Symposium on Biometrics and Security Technologies (ISBAST) (pp. 238-243). IEEE.
Zhang, J., Chen, B., Gong, L., & Gu, Z. (2019). Research on malware detection technology based on image analysis. Netinfo Security, 19(10), 24–31.
Lyda, R., & Hamrock, J. (2007). Using entropy analysis to find encrypted and packed malware. IEEE Security & Privacy, 5(2), 40–45.
Moser, A., Kruegel, C., Kirda, E. (2007, December). Limits of static analysis for malware detection. In Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) (pp. 421-430). IEEE.
Egele, M., Scholte, T., Kirda, E., & Kruegel, C. (2008). A survey on automated dynamic malware-analysis techniques and tools. ACM computing surveys (CSUR), 44(2), 1–42.
Cheng, Y., Fan, W., Huang, W., & An, J. (2017, September). A shellcode detection method based on full native api sequence and support vector machine. In IOP Conference Series: Materials Science and Engineering (Vol. 242, no. 1, p. 012124).
Mosli, R., Li, R., Yuan, B., & Pan, Y. (2017, January). A behavior-based approach for malware detection. In IFIP International Conference on Digital Forensics (pp. 187-201). Springer, Cham.
Raff, E., Barker, J., Sylvester, J., Brandon, R., Catanzaro, B., Nicholas, C, K. (2018, June). Malware detection by eating a whole exe. In Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence.
Siddiqui, M., Wang, M. C., Lee, J. (2008, April). Detecting trojans using data mining techniques. In International Multi Topic Conference (pp. 400-411). Springer, Berlin, Heidelberg.
Acknowledgments
This work was supported by grants from the Natural Science Foundation of Guangdong Province No.2018A0303130082, The Features Innovation Program of the Department of Education of Foshan under Grant Numbers 2019, Basic and Applied Basic Research Fund of Guangdong Province No.2019A1515111080, and Natural Science Foundation of China No.61802061.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Huang, X., Ma, L., Yang, W. et al. A Method for Windows Malware Detection Based on Deep Learning. J Sign Process Syst 93, 265–273 (2021). https://doi.org/10.1007/s11265-020-01588-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11265-020-01588-1