skip to main content
10.1109/ICASSP.2017.7952603guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Malware classification with LSTM and GRU language models and a character-level CNN

Published: 05 March 2017 Publication History

Abstract

Malicious software, or malware, continues to be a problem for computer users, corporations, and governments. Previous research [1] has explored training file-based, malware classifiers using a two-stage approach. In the first stage, a malware language model is used to learn the feature representation which is then input to a second stage malware classifier. In Pascanu et al. [1], the language model is either a standard recurrent neural network (RNN) or an echo state network (ESN). In this work, we propose several new malware classification architectures which include a long short-term memory (LSTM) language model and a gated recurrent unit (GRU) language model. We also propose using an attention mechanism similar to [12] from the machine translation literature, in addition to temporal max pooling used in [1], as an alternative way to construct the file representation from neural features. Finally, we propose a new single-stage malware classifier based on a character-level convolutional neural network (CNN). Results show that the LSTM with temporal max pooling and logistic regression offers a 31.3% improvement in the true positive rate compared to the best system in [1] at a false positive rate of 1%.

7. References

[1]
Razvan Pascanu, Jack W. Stokes, Hermineh Sanossian, Mady Marinescu, and Anil Thomas, “Malware classification with recurrent networks,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2015, pp. 1916–1920.
[3]
George E. Dahl, Jack W. Stokes, Li Deng, and Dong Yu, “Large-scale malware classification using random projections and neural networks,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2013.
[4]
Joshua Saxe and Konstantin Berlin, “Deep neural network based malware detection using two dimensional binary program features,” arXiv preprint arXiv: 1508. 03096v2, 2015.
[5]
Wenyi Huang and Jack W. Stokes, “Mtnet: A multi-task neural network for dynamic malware classfication,” in Proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2016, pp. 399–418.
[6]
Seonhee Seok and Howon Kim, “Visualized malware classification based-on convolutional neural network,” in Proceedings of Korea Institutes of Information Security and Cryptology, 2016, pp. 197–208.
[7]
T. Mikolov, M Karafiat, L. Burget, J. Cernocky, and S Khundanpur, “Recurrent neural network based language model,” in Proceedings of Interspeech, 2010.
[8]
H. Jaeger and H. Haas, “Harnessing nonlinearity: Predicting chaotic systems and saving energy in wireless communication,” in Science, 2004.
[9]
Junyoung Chung, Caglar Gulcehre, KyungHyun Cho, and Yoshua Bengio, “Empirical evaluation of gated recurrent neural networks on sequence modeling,” in NIPS 2014 Deep Learning and Representation Learning Workshop, 2014.
[10]
Sepp Hochreiter and Jurgen Schmidhuber, “Long short-term memory,” in Proceedings of Neural Computation, 1997, pp. 1735–1780.
[11]
Kyunghyun Cho, Bart van Merrienboer, Dzmitry Bahdanau, and Yoshua Bengio, “On the properties of neural machine translation: Encoder-decoder approaches,” in Proceedings of the Workshop on Syntax, Semantics and Structure in Statistical Translation (SSST), 2014.
[12]
Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio, “Neural machine translation by jointly learning to align and translate,” in Proceedings of the International Conference on Learning Representations (ICLR), 2015.
[13]
Y. Bengio, N. Boulanger-Lewandowski, and R. Pascanu, “Advances in optimizing recurrent networks,” in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2013.
[14]
Mike Schuster and Kuldip K. Paliwal, “Bidirectional recurrent neural networks,” IEEE Transactions on Signal Processing, vol. 45, pp. 2673–2681, November 1997.
[15]
Keras Development Team, “Keras: Deep learning library for theano and tensorflow,” https://keras.io/, 2016.
[16]
Vinod Nair and Geoffrey E Hinton, “Rectified linear units improve restricted boltzmann machines,” in Proceedings of the International Conference on Machine Learning (ICML), 2010, pp. 807–814.
[17]
Xiang Zhang, Junbo Zhao, and Yann LeCun, “Character-level convolutional networks for text classification,” in Advances in Neural Information Processing Systems (NIPS), C. Cortes, N. D. Lawrence, D. D. Lee, M. Sugiyama, and R. Garnett, Eds., pp. 649–657. Curran Associates, Inc., 2015.
[18]
N. Idika and A.P. Mathur, “A survey of malware detection techniques,” Tech. Rep., Purdue Univ., February 2007.
[19]
Theano Development Team, “Theano: A Python framework for fast computation of mathematical expressions,” ar Xiv e-prints, vol. abs/1605.02688, May 2016.
[20]
Jeffrey O. Kephart, “A biologically inspired immune system for computers” in In Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems. 1994, pp. 130–139, MIT Press.
[21]
M.G. Schultz, Eleazar Eskin, E. Zadok, and S. Stolfo, “Data mining methods of detection of new malicious executables,” in Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001, pp. 38–49.
[22]
J.Z. Kolter and M.A. Maloof, “Learning to detect and classify malicious executables in the wild,” in Journal of Machine Learning Research, 2006, pp. 2721–2744.
[23]
Wenke Lee, Saivatore J. Stolfo, and Kui W. Mok, “A Data Mining Framework for Building Intrusion Detection Models,” Proceedings of the IEEE Symposium on Security and Privacy (SP), pp. 120–132, 1999.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Mar 2017
6527 pages

Publisher

IEEE Press

Publication History

Published: 05 March 2017

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media