Abstract
Malware (Malicious Software) is a malicious piece of code designed with the intention to enter a computer system to carry out harmful operations. It poses a severe threat to computer and internet users. As the number of new malwares increases, the challenge of identifying and classifying them into appropriate families gets more difficult. During the last couple of years, deep convolutional neural network (CNN)-based models resulted promising performance on malware classification. However, the existing deep CNN-based approaches require higher resources in terms of storage and computationally heavy training operations for feeding a large number of data to the CNN model. As a result, the existing approaches are not suitable for malware detection in Internet of things (IoT) applications as IoT-based applications are mostly resource-constrained in nature. To address this issue, exploring lightweight deep learning models for malware detection in resource-constrained devices without compromising accuracy is required. In this regard, the current work proposes a custom lightweight deep convolutional neural network for malware image classification. The proposed technique is used to extract the characteristic features of the malware sample and use the extracted features to classify them into their corresponding malware families by feeding an image to proposed CNN model with Adam optimizer as an input. This furnishes useful information for human analysts without prior knowledge and can be deployed efficiently in IoT applications to aid in developing protection against malwares. The model is validated through multiple trials, demonstrating that the model achieves 96.64% accuracy. The designed CNN model is extremely lightweight and hence can be aptly fit in resource-constrained applications.












Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ye Y, Li T, Adjeroh D, Iyengar SS (2017) A survey on malware detection using data mining techniques. ACM Comput Surv (CSUR) 50(3):1–40
Jain M, Andreopoulos W, Stamp M (2021) Cnn vs elm for image-based malware classification. arXiv preprint arXiv:2103.13820
Choi S-Y, Lim CG, Kim Y-M (2019) Automated link tracing for classification of malicious websites in malware distribution networks. J Inf Process Syst 15(1):100–115
Ahmadi M, Ulyanov D, Semenov S, Trofimov M, Giacinto G (2016) Novel feature extraction, selection and fusion for effective malware family classification. In: Proceedings of the sixth ACM conference on data and application security and privacy, pp 183–194
Kalash M, Rochan M, Mohammed N, Bruce ND, Wang Y, Iqbal F (2018) Malware classification with deep convolutional neural networks. In: 2018 9th IFIP international conference on new technologies, mobility and security (NTMS). IEEE, pp 1–5
Le Q, Boydell O, Mac Namee B, Scanlon M (2018) Deep learning at the shallow end: malware classification for non-domain experts. Digit Investig 26:118–126
Cui Z, Xue F, Cai X, Cao Y, Wang G-G, Chen J (2018) Detection of malicious code variants based on deep learning. IEEE Trans Industr Inf 14(7):3187–3196
Yakura H, Shinozaki S, Nishimura R, Oyama Y, Sakuma J (2019) Neural malware analysis with attention mechanism. Comput Secur 87:101592
Rezende E, Ruppert G, Carvalho T, Ramos F, De Geus P (2017) Malicious software classification using transfer learning of resnet-50 deep neural network. In: 2017 16th IEEE international conference on machine learning and applications (ICMLA). IEEE, pp 1011–1014
Gao X, Hu C, Shan C, Liu B, Niu Z, Xie H (2020) Malware classification for the cloud via semi-supervised transfer learning. J Inf Secur Appl 55:102661
Darem A, Abawajy J, Makkar A, Alhashmi A, Alanazi S (2021) Visualization and deep-learning-based malware variant detection using opcode-level features. Futur Gener Comput Syst 125:314–323
Marastoni N, Giacobazzi R, Dalla Preda M (2021) Data augmentation and transfer learning to classify malware images in a deep learning context. J Comput Virol Hacking Tech 17:1–19
Yan J, Qi Y, Rao Q (2018) Detecting malware with an ensemble method based on deep neural network. Secur Commun Netw 2018
Khan RU, Zhang X, Kumar R (2019) Analysis of resnet and googlenet models for malware detection. J Comput Virol Hacking Tech 15(1):29–37
Vinayakumar R, Alazab M, Soman K, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525–41550
Namanya AP, Awan IU, Disso JP, Younas M (2020) Similarity hash based scoring of portable executable files for efficient malware detection in IoT. Futur Gener Comput Syst 110:824–832
Darwish A, Ezzat D, Hassanien AE (2020) An optimized model based on convolutional neural networks and orthogonal learning particle swarm optimization algorithm for plant diseases diagnosis. Swarm Evol Comput 52:100616
Venkatraman S, Alazab M, Vinayakumar R (2019) A hybrid deep learning image-based analysis for effective malware detection. J Inf Secur Appl 47:377–389
Çayır A, Ünal U, Dağ H (2021) Random capsnet forest model for imbalanced malware type classification task. Comput Secur 102:102133
Naeem H, Ullah F, Naeem MR, Khalid S, Vasan D, Jabbar S, Saeed S (2020) Malware detection in industrial internet of things based on hybrid image visualization and deep learning model. Ad Hoc Netw 105:102154
Go JH, Jan T, Mohanty M, Patel OP, Puthal D, Prasad M (2020) Visualization approach for malware classification with resnext. In: 2020 IEEE congress on evolutionary computation (CEC). IEEE, pp 1–7
Kumar S et al (2021) Mcft-cnn: malware classification with fine-tune convolution neural networks using traditional and transfer learning in internet of things. Futur Gener Comput Syst 125:334–351
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Hota, A., Panja, S. & Nag, A. Lightweight CNN-based malware image classification for resource-constrained applications. Innovations Syst Softw Eng 21, 1–14 (2025). https://doi.org/10.1007/s11334-022-00461-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11334-022-00461-7