Skip to main content

Deep Convolutional Neural Networks Network with Transfer Learning for Image-Based Malware Analysis

  • Conference paper
  • First Online:
International Conference on Innovative Computing and Communications (ICICC 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 537))

Included in the following conference series:

  • 121 Accesses

Abstract

The complexity of classifying malware is high since it may take many forms and is constantly changing. With the help of transfer learning and easy access to massive data, neural networks may be able to easily manage this problem. This exploratory work aspires to swiftly and precisely classify malware shown as grayscale images into their various families. The VGG-16 model, which had already been trained, was used together with a learning algorithm, and the resulting accuracy was 88.40%. Additionally, the Inception-V3 algorithm for classifying malicious images into family members did significantly improve their unique approach when compared with the ResNet-50. The proposed model developed using a convolution neural network outperformed the others and correctly identified malware classification 94.7% of the time. Obtaining an F1-score of 0.93, our model outperformed the industry-standard VGG-16, ResNet-50, and Inception-V3. When VGG-16 was tuned incorrectly, however, it lost many of its parameters and performed poorly. Overall, the malware classification problem is eased by the approach of converting it to images and then classifying the generated images.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. LeCun Y, Bengio Y (1995) Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks, vol 3361, no 10

    Google Scholar 

  2. Vasan D, Alazab M, Wassan S, Naeem H, Safaei B, Zheng Q (2020) IMCFN: image-based malware classification using fine-tuned convolutional neural network architecture. Comput Netw 171:107138

    Article  Google Scholar 

  3. Kalash M, Rochan M, Mohammed N, Bruce ND, Wang Y, Iqbal F (2018) Malware classification with deep convolutional neural networks. In: 2018 9th IFIP ınternational conference on new technologies, mobility and security (NTMS). IEEE, pp 1–5

    Google Scholar 

  4. Gibert D, Mateu C, Planes J (2019) A hierarchical convolutional neural network for malware classification. In: 2019 international joint conference on neural networks (IJCNN). IEEE, pp 1–8

    Google Scholar 

  5. LeCun Y, Boser B, Denker JS, Henderson D, Howard RE, Hubbard W, Jackel LD (1989) Backpropagation applied to handwritten zip code recognition. Neural Comput 1(4):541–551

    Article  Google Scholar 

  6. Nataraj L, Karthikeyan S, Jacob G, Manjunath BS (2011) Malware images: visualization and automatic classification. In: Proceedings of the 8th international symposium on visualization for cyber security, pp 1–7

    Google Scholar 

  7. Nataraj L, Karthikeyan S, Jacob G, Manjunath B (2011) Available at: https://www.dropbox.com/s/ep8qjakfwh1rzk4/malimg_dataset.zip?dl=0 [Online]

  8. Ahmadi M, Ulyanov D, Semenov S, Trofimov M, Giacinto G (2016) Novel feature extraction, selection, and fusion for effective malware family classification. In: Proceedings of the sixth ACM conference on data and application security and privacy, pp 183–194

    Google Scholar 

  9. Gandotra E, Bansal D, Sofat S. Malware analysis and classification: a survey. J Inf Secur (2014)

    Google Scholar 

  10. Abusitta A, Li MQ, Fung BC (2021) Malware classification and composition analysis: a survey of recent developments. J Inf Secur Appl 59:102828

    Google Scholar 

  11. Ni S, Qian Q, Zhang R (2018) Malware identification using visualization images and deep learning. Comput Secur 77:871–885

    Article  Google Scholar 

  12. Lad SS, Adamuthe AC (2020) Malware classification with ımproved convolutional neural network model. Int J Comput Netw Inf Secur 12(6)

    Google Scholar 

  13. Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556

  14. Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2818–2826

    Google Scholar 

  15. Asam M, Khan SH, Jamal T, Zahoora U, Khan A (2021) Malware classification using deep boosted learning. arXiv preprint arXiv:2107.04008

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. S. Jeyalakshmi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jeyalakshmi, V.S., Krishnan, N., Jayapriya, J. (2023). Deep Convolutional Neural Networks Network with Transfer Learning for Image-Based Malware Analysis. In: Hassanien, A.E., Castillo, O., Anand, S., Jaiswal, A. (eds) International Conference on Innovative Computing and Communications. ICICC 2023. Lecture Notes in Networks and Systems, vol 537. Springer, Singapore. https://doi.org/10.1007/978-981-99-3010-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-3010-4_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-3009-8

  • Online ISBN: 978-981-99-3010-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics