Malware Threat Detection using Deep Neural Networks

Authors

  • Sriram Muralidharan  Department of Computer Science and Engineering, SSN College of Engineering, Kanchipuram, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT2173117

Keywords:

Static Malware Analysis, Threat Detection, Deep Learning, Convolutional Neural Networks, Recurrent Neural Networks and Autoencoders.

Abstract

Malware threat detection is one of the most challenging tasks in the field of Information Security and the shortage of qualified personnel makes it even harder for people to keep their information secure. Moreover, malware design has evolved continuously, making it even more difficult for people to protect themselves from malware attacks. Thus, it is the need of the hour to improve the existing malware threat detection systems with modern deep learning algorithms. This paper focuses on bringing together a comprehensive study of various deep learning solutions for the detection of malware from its PE file (Portable Executable File) byte streams.

References

  1. Ionut Ilascu. 2014. Four New Malware Samples Emerge Every Second. https://news.softpedia.com/news/Four-New-Malware-Samples-Emerge-Every-Second-457576.shtml
  2. Satya Narayan Tripathy, Sisira Kumar Kapat, M. Soujanya, Susanta Kumar Das, "Static Malware Analysis : A Case Study", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 7, pp.135-141, September-2017.
  3. Soumen Chakraborty, "Malware attack and Malware Analysis : A Research", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.268-272, May-June-2019.
  4. Nataraj, Lakshmanan & Karthikeyan, Shanmugavadivel & Jacob, Grégoire & Manjunath, B.. (2011). Malware Images: Visualization and Automatic Classification. 10.1145/2016904.2016908.
  5. Angelo Oliveira, 2019. Malware Analysis Datasets: Raw PE as Image. (Nov 2019) Available at: https://dx.doi.org/10.21227/8brp-j220.
  6. O'Shea, Keiron & Nash, Ryan. (2015). An Introduction to Convolutional Neural Networks. ArXiv e-prints.
  7. Hochreiter, Sepp & Schmidhuber, Jürgen. (1997). Long Short-term Memory. Neural computation. 9. 1735-80. 10.1162/neco.1997.9.8.1735.
  8. Bank, Dor & Koenigstein, Noam & Giryes, Raja. (2020). Autoencoders. ArXiv e-prints.
  9. Agarwal, Akarsh & Motwani, Akash. (2016). An overview of Convolutional and AutoEncoder Deep Learning Algorithm.
  10. M. Mishra and M. Srivastava, "A view of Artificial Neural Network," 2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014), 2014, pp. 1-3, doi: 10.1109/ICAETR.2014.7012785..
  11. Bhodia, Niket & Prajapati, Pratikkumar & Di Troia, Fabio & Stamp, Mark. (2019). Transfer Learning for Image-Based Malware Classification. 10.5220/0007701407190726.
  12. Hossin, Mohammad & M.N, Sulaiman. (2015). A Review on Evaluation Metrics for Data Classification Evaluations. International Journal of Data Mining & Knowledge Management Process. 5. 01-11. 10.5121/ijdkp.2015.5201.
  13. Stamp, Mark & Alazab, Mamoun & Shalaginov, Andrii. (2021). Malware Analysis Using Artificial Intelligence and Deep Learning. 10.1007/978-3-030-62582-5.

Downloads

Published

2021-06-30

Issue

Section

Research Articles

How to Cite

[1]
Sriram Muralidharan, " Malware Threat Detection using Deep Neural Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 3, pp.515-522, May-June-2021. Available at doi : https://doi.org/10.32628/CSEIT2173117