Classification of malware by using structural entropy on convolutional neural networks

3Citations
Citations of this article
46Readers
Mendeley users who have this article in their library.

Abstract

The number of malicious programs has grown both in number and in sophistication. Analyzing the malicious intent of vast amounts of data requires huge resources and thus, effective categorization of malware is required. In this paper, the content of a malicious program is represented as an entropy stream, where each value describes the amount of entropy of a small chunk of code in a specific location of the file. Wavelet transforms are then applied to this entropy signal to describe the variation in the entropic energy. Motivated by the visual similarity between streams of entropy of malicious software belonging to the same family, we propose a file agnostic deep learning approach for categorization of malware. Our method exploits the fact that most variants are generated by using common obfuscation techniques and that compression and encryption algorithms retain some properties present in the original code. This allows us to find discriminative patterns that almost all variants in a family share. Our method has been evaluated using the data provided by Microsoft for the BigData Innovators Gathering Anti-Malware Prediction Challenge, and achieved promising results in comparison with the State of the Art.

Cite

CITATION STYLE

APA

Gibert, D., Mateu, C., Planes, J., & Vicens, R. (2018). Classification of malware by using structural entropy on convolutional neural networks. In Proceedings of the 30th Innovative Applications of Artificial Intelligence Conference, IAAI 2018 (pp. 7759–7764). The AAAI Press. https://doi.org/10.1609/aaai.v32i1.11409

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free