Malware detection and classification using embedded convolutional neural network and long short-term memory technique

Theophilus Aniemeka Enem, Olalekan J. Awujoola
{"title":"Malware detection and classification using embedded convolutional neural network and long short-term memory technique","authors":"Theophilus Aniemeka Enem, Olalekan J. Awujoola","doi":"10.4314/swj.v18i2.6","DOIUrl":null,"url":null,"abstract":"The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks. As the use of encryption protocols increases, so does the challenge of identifying malware encrypted traffic also increases. Malware is a threat to people in the cyber world, as it steals personal information and harms computer systems. Network attacks refer to all types of unauthorized access to a network, including any attempts to damage and disrupt the network. This often leads to serious consequences. However, various researchers, developers and information security specialists around the globe continuously work on strategies for detecting malware. Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs, such as using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) to classify malicious traffic. But, with the diverse nature of malware, it is difficult to extract features from it. Therefore, existing solutions require more computing resources since available resources are not efficient for datasets with large numbers of samples. Also, adopting existing feature extractors for extracting features of images consumes more resources. This paper therefore solved these problems by combining a 1D convolutional neural network (CNN) and long short-term memory (LSTM) to adequately detect and classify malicious encrypted traffic. This work was conducted on the malware Analysis benchmark Datasets with API Call Sequences, which contains 42,797 malwares and 1,079 goodware API call sequences. The experimental results show that our proposed system has achieved 99.2% accuracy and outperformed all other state-of-the-art models.","PeriodicalId":21583,"journal":{"name":"Science World Journal","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Science World Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4314/swj.v18i2.6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks. As the use of encryption protocols increases, so does the challenge of identifying malware encrypted traffic also increases. Malware is a threat to people in the cyber world, as it steals personal information and harms computer systems. Network attacks refer to all types of unauthorized access to a network, including any attempts to damage and disrupt the network. This often leads to serious consequences. However, various researchers, developers and information security specialists around the globe continuously work on strategies for detecting malware. Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs, such as using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) to classify malicious traffic. But, with the diverse nature of malware, it is difficult to extract features from it. Therefore, existing solutions require more computing resources since available resources are not efficient for datasets with large numbers of samples. Also, adopting existing feature extractors for extracting features of images consumes more resources. This paper therefore solved these problems by combining a 1D convolutional neural network (CNN) and long short-term memory (LSTM) to adequately detect and classify malicious encrypted traffic. This work was conducted on the malware Analysis benchmark Datasets with API Call Sequences, which contains 42,797 malwares and 1,079 goodware API call sequences. The experimental results show that our proposed system has achieved 99.2% accuracy and outperformed all other state-of-the-art models.
基于嵌入式卷积神经网络和长短期记忆技术的恶意软件检测与分类
互联网使用的显著增长和网络技术的快速发展与网络攻击风险的增加有关。随着加密协议使用的增加,识别恶意软件加密流量的挑战也在增加。恶意软件对网络世界的人们来说是一种威胁,因为它窃取个人信息并损害计算机系统。网络攻击是指对网络的各种未经授权的访问,包括任何破坏和破坏网络的企图。这往往会导致严重的后果。然而,全球各地的各种研究人员、开发人员和信息安全专家不断致力于检测恶意软件的策略。近年来,深度学习已成功应用于网络安全评估和入侵检测系统,并取得了诸多突破,例如利用卷积神经网络(CNN)和长短期记忆(LSTM)对恶意流量进行分类。但是,由于恶意软件的多样性,很难从中提取特征。因此,现有的解决方案需要更多的计算资源,因为可用的资源对于大量样本的数据集来说效率不高。同时,采用现有的特征提取器提取图像的特征会消耗更多的资源。因此,本文通过将一维卷积神经网络(CNN)与长短期记忆(LSTM)相结合来充分检测和分类恶意加密流量,从而解决了这些问题。这项工作是在带有API调用序列的恶意软件分析基准数据集上进行的,其中包含42,797个恶意软件和1,079个良好的软件API调用序列。实验结果表明,我们提出的系统达到了99.2%的准确率,优于所有其他最先进的模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信