Skip to main content

Malware Classification Using Multi-layer Perceptron Model

  • Conference paper
  • First Online:
International Conference on Innovative Computing and Communications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1166))

Abstract

Malicious software harms computer and network resources. For malware detection, various machine learning and deep learning algorithms are used. In this paper, binary classification of benign and malware files is done using a multi-layer perceptron model using dynamic features. Both malware and benign samples are executed into the dynamic analysis environment using the Cuckoo sandbox. Cuckoo sandbox generates the detailed behavioural reports which consist of several runtime features like API calls, registry changes and network activities. These features are investigated and represented as a training feature set. After that multi-layer perceptron model is trained over the training feature set. Different parameter values of activation function, loss function and alpha (regularization parameter) are used for training the multi-layer perceptron model to develop the optimal malware classifier. The proposed malware classifier produced an accuracy of 99.2% using the Adam loss function in binary classification of the executable files.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Alaeiyan, S. Parsa, M. Conti, Analysis and classification of context-based malware behavior. Comput. Commun. 136, 76–90 (2019)

    Google Scholar 

  2. Q.K. Ali Mirza, I. Awan, M. Younas, CloudIntell: an intelligent malware detection system. Future Gener. Comput. Syst. 1–12 (2017)

    Google Scholar 

  3. AV-TEST, Malware Statistics & Trends Report, https://www.avtest.org/en/statistics/malware (2019)

  4. J. Singh, J. Singh, Ransomware: an illustration of malicious cryptography. Int. J. Recent Technol. Eng. (IJRTE) 8(2), 1608–1611 (2019)

    Article  Google Scholar 

  5. M. Wagner, A. Rind, N. Thür, W. Aigner, A knowledge-assisted visual malware analysis system: design, validation, and reflection of KAMAS. Comput. Secur. 67, 1–15 (2017)

    Google Scholar 

  6. J. Zhang, Machine learning with feature selection using principal component analysis for malware detection: a case study. Sophos, January 2019

    Google Scholar 

  7. P. Burnap, R. French, F. Turner, K. Jones, Malware classification using self organising feature maps and machine activity data. Comput. Secur. 73, 399–410 (2017)

    Google Scholar 

  8. W. Mao, Z. Cai, D. Towsley, Q. Feng, X. Guan, Security importance assessment for system objects and malware detection. Comput. Secur. 68, 47–68 (2017)

    Google Scholar 

  9. J. Singh, J. Singh, Detection of malicious software by analyzing the behavioral artifacts using machine learning algorithms. Inf. Softw. Technol. 121(January), 106273 (2020). https://doi.org/10.1016/j.infsof.2020.106273

    Article  Google Scholar 

  10. J. Singh, J. Singh, Challenges of malware analysis: obfuscation techniques. Int. J. Inf. Secur. Sci. 7(3), 100–110 (2018)

    Google Scholar 

  11. A. Pfeffer, B. Ruttenberg, L. Kellogg, M. Howard, C. Call, A. O’Connor, J. Frank, Artificial Intelligence Based Malware Analysis, pp. 1–38 (2017)

    Google Scholar 

  12. D. Gavrilut, M. Mihai Cimpoes, D. Anton, L. Ciortuz, Malware detection using machine learning, in Proceedings of the International Multiconference on Computer Science and Information Technology (2009), pp. 735–741

    Google Scholar 

  13. A. Shabtai, R. Moskovitch, C. Feher, S. Dolev, Y. Elovici, Detecting unknown malicious code by applying classification techniques on OpCode patterns. Secur. Inf. 1(1), 1–22 (2012)

    Google Scholar 

  14. Z. Pan, C. Feng, C. Tang, Malware classification based on the behavior analysis and back propagation neural network, in ITM Web of Conferences, China (2016), pp. 1–5

    Google Scholar 

  15. B.N. Narayanan, O. Djaneye-boundjou, T.M. Kebede, Performance analysis of machine learning and pattern recognition algorithms for malware classification, in IEEE Aerospace and Electronics Conference and Ohio Innovation Summit, Dayton, OH, USA (2016), pp. 338–342

    Google Scholar 

  16. I. Ghafir, M. Hammoudeh, V. Prenosil, L. Han, Detection of advanced persistent threat using machine-learning correlation analysis. Future Gener. Comput. Syst. 89, 340–349 (2018)

    Google Scholar 

  17. Q. Le, O. Boydell, B. Mac, M. Scanlon, Deep learning at the shallow end: malware classification for non-domain experts. Digital Invest. 26, 118–126 (2018)

    Google Scholar 

  18. J. Stiborek, T. Pevný, M. Rehák, Multiple instance learning for malware classification. Expert Syst. Appl. 93, 346–357 (2018)

    Google Scholar 

  19. H. Zhang, X. Xiao, F. Mercaldo, S. Ni, F. Martinelli, Classification of ransomware families with machine learning based on N-gram of opcodes. Future Gener. Comput. Syst. 90, 211–221 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jagsir Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, J., Singh, J. (2021). Malware Classification Using Multi-layer Perceptron Model. In: Gupta, D., Khanna, A., Bhattacharyya, S., Hassanien, A.E., Anand, S., Jaiswal, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1166. Springer, Singapore. https://doi.org/10.1007/978-981-15-5148-2_14

Download citation

Publish with us

Policies and ethics