Skip to main content

A Deep Learning Approach to Image-Based Malware Analysis

  • Conference paper
  • First Online:
Progress in Computing, Analytics and Networking

Abstract

Malicious software also referred to as “Malware” is one of the serious threats on the Internet today since it has been growing exponentially over the last decade according to research, causing substantial financial trouble to various organizations. Different security companies have been proposing different techniques to defend from this threat which is a major challenge on the complexity and growing volumes. Recently, malware communities and researchers have begun to apply machine learning and deep learning model to detect potential threats. We propose a malware classification model that takes advantage of the potential of deep learning (DL) models using the convolutional neural network (CNN) and combination of machine learning classifier with CNN such as support vector machine (SVM) for classifying their families. Detection of newly released malware using such models would be possible through mathematical function. That is, \( f{:}n \to z \), where n is the given malware and z is their corresponding malware family. Malimg dataset is used to perform the experiment which contains malware image of 25 malware families and 9339 malware samples. CNN has outperformed the CNN-SVM with a test accuracy of 97.5%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.: Malware Images: Visualization and Automatic Classification (2011)

    Google Scholar 

  2. Tang, Y.: Deep Learning using Linear Support Vector Machines (2013)

    Google Scholar 

  3. Kosmidis, K., Kalloniatis, C.: Machine Learning and Images for Malware Detection and Classification (2017)

    Google Scholar 

  4. Agarap, A.F., Pepito, F.J.H.: Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine (SVM) for Malware Classification (2017)

    Google Scholar 

  5. Su, J., Danilo Vasconcellos, V., Prasad, S., Daniele, S., Feng, Y., Sakurai, K.: Lightweight classification of IoT malware based on image recognition. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), pp. 664–669. Tokyo (2018)

    Google Scholar 

  6. Cortes, C., Vapnik, V.N.: Support vector networks. Mach. Learn. (1995)

    Google Scholar 

  7. AVG-Test Institute: (2019). https://www.av-test.org/en/statistics/malware/. Accessed 20 May 2019

  8. Hunter, J.D.: Matplotlib: A 2D graphics environment. Comput. Sci. Eng. 9(3), 90–95 (2007). https://doi.org/10.1109/MCSE.2007.55

  9. Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12(2011), 2825–2830 (2011)

    MathSciNet  MATH  Google Scholar 

  10. van der Walt, S., Colbert, S.C., Varoquaux, G.: The NumPy array: a structure for efficient numerical computation. Comput. Sci. Eng. 13(2), 22–30 (2011)

    Google Scholar 

  11. Vinod, P., Jaipur, R., Laxmi, V., Gaur, M.: Survey on malware detection methods. In: Proceedings of the 3rd Hackers’ Workshop on Computer and Internet Security, pp. 74–79 (2009)

    Google Scholar 

  12. Nataraj, L., Yegneswaran, V., Porras, P., Zhang, J.: A Comparative Assessment of Malware Classification Using Binary Texture Analysis and Dynamic Analysis, pp. 21–30 (2011)

    Google Scholar 

  13. Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Corrado, G.S., Davis, A., Dean, J., Devin, M., Ghemawat, S., Goodfellow, I., Harp, A., Irving, G., Isard, M., Jozefowicz, R., Jia, Y., Kaiser, L., Kudlur, M., Levenberg, J., ManÃl’, D., Schuster, M., Monga, R., Moore, S., Murray, D., Olah, C., Shlens, J., Steiner, B., Sutskever, I., Talwar, K., Tucker, P., Vanhoucke, V., Vasudevan, V., ViÃl’gas, F., Vinyals, O., Warden, P., Wattenberg, M., Wicke, M., Yu, Y., Zheng, X.: TensorFlow: large-scale machine learning on heterogeneous systems Software (2015). Available from www.tensorflow.org

  14. Gandotra, E., Bansal, D., Sofat, S.: Malware analysis and classification: a survey. J. Inf. Secur. 5, 56–64 (2014)

    Google Scholar 

  15. Udayakumar, N., Saglani, V.J., Cupta, A.V., Subbulakshmi, T.: Malware classification using machine learning algorithms. In: 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1–9. Tirunelveli (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gurumayum Akash Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, G.A., Singh, K.J., Singh, M.D. (2020). A Deep Learning Approach to Image-Based Malware Analysis. In: Das, H., Pattnaik, P., Rautaray, S., Li, KC. (eds) Progress in Computing, Analytics and Networking. Advances in Intelligent Systems and Computing, vol 1119. Springer, Singapore. https://doi.org/10.1007/978-981-15-2414-1_33

Download citation

Publish with us

Policies and ethics