A Malware Classification Method Using visualization and Word Embedding Features
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 1
Abstract
With the explosive growth of threats to Internet security, malware visualization in malware classification has become a promising study area in security and machine learning. This paper proposes a visualization method for malware analysis based on word embedding features of byte sequences.Based on some assistant information such as word embedding, the basic to a strong malware classification approach is to transfer the learned information from the malware domain to the image domain, which needs correlation modeling between these domains. However, most current methods neglect to model the relationships in an embedding way, ensue in low performance of malware classification. To catch this challenge, we consider the Word Embeddings duty as a Semantic Information Extraction. Our Proposed method aims to learn effective representations of malware families, which takes as input a set of embedded vectors corresponding to the malware. Word embedding is designed to generate features of a malware sample by leveraging its malware semantics. Our results show that visual models in the domain of images can be used for efficient malware classification. We evaluated our method on the kaggle dataset of Windows PE file instances, obtaining an average classification accuracy of 0.9896%.
Authors and Affiliations
Esmaeil Bastami,Hadi Soltanizadeh,Mohammad Rahmanimanesh,Parviz Keshavarzi,
Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network
Deflecting missile’s radar guidance or missile’s seeker by chaff is a common and effective defensive method which is used in military vessels. To counter this defensive measure, methods for recognition targets from chaff...
Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis
Cybercriminals are targeting more humans than machines these days because they try to exploit users' vulnerabilities to achieve their destructive goals. The main purpose of this study is to identify the factors affecting...
A Malware Classification Method Using visualization and Word Embedding Features
With the explosive growth of threats to Internet security, malware visualization in malware classification has become a promising study area in security and machine learning. This paper proposes a visualization method fo...
Identify malicious traffic on IoT infrastructure using neural networks and deep learning
The Internet of Things is a network of physical devices and equipment that includes sensors, software, and other technologies for exchanging data with other devices and systems over the Internet. The spread of the Intern...
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications
Nowadays, Android-based devices such as smart phones, tablets, and recently virtual reality headsets have found increasing usage in our daily lives. Along with the development of software for these devices, new malicious...