Malware-Detection Method with a Convolutional Recurrent Neural Network Using Opcode Sequences
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jeon, Seungho | - |
dc.contributor.author | Moon, Jongsub | - |
dc.date.accessioned | 2021-08-30T13:51:38Z | - |
dc.date.available | 2021-08-30T13:51:38Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2020-10 | - |
dc.identifier.issn | 0020-0255 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/53044 | - |
dc.description.abstract | This paper presents a novel malware-detection model with a convolutional recurrent neural network using opcode sequences. Statistically, an executable file is considered as a set of consecutive machine codes. First, the theoretical foundation on which opcode sequences can be used to detect malware has been discussed. Next, an algorithm for extracting opcode sequences from executables and a deep learning-based malware-detection method that uses the opcode sequences as input have been presented. The proposed model comprises an opcode-level convolutional autoencoder that transforms a long opcode sequence to a relatively short compressed sequence at the front end and a dynamic recurrent neural network classifier that performs a prediction task using the codes generated by the opcodelevel convolutional autoencoder at the rear end. Experimentally, the proposed model provided a malware-detection accuracy of 96%, receiver operating characteristic-area under the curve of 0.99, and true positive rate (TPR) of 95%. The highest accuracy and TPR achieved by existing malware-detection methods using opcode sequences were 97% and 82%, respectively. Compared with this method, the proposed model delivered a slightly lower accuracy of 96% but a considerably larger TPR of 95%. Therefore, the proposed model is capable of more reliable malware detection. (C) 2020 Elsevier Inc. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.title | Malware-Detection Method with a Convolutional Recurrent Neural Network Using Opcode Sequences | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Moon, Jongsub | - |
dc.identifier.doi | 10.1016/j.ins.2020.05.026 | - |
dc.identifier.scopusid | 2-s2.0-85085275166 | - |
dc.identifier.wosid | 000542608500001 | - |
dc.identifier.bibliographicCitation | INFORMATION SCIENCES, v.535, pp.1 - 15 | - |
dc.relation.isPartOf | INFORMATION SCIENCES | - |
dc.citation.title | INFORMATION SCIENCES | - |
dc.citation.volume | 535 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 15 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.subject.keywordAuthor | Malware detection | - |
dc.subject.keywordAuthor | Opcode sequence | - |
dc.subject.keywordAuthor | Deep learning | - |
dc.subject.keywordAuthor | Convolutional neural networks | - |
dc.subject.keywordAuthor | Recurrent neural networks | - |
dc.subject.keywordAuthor | Autoencoder | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.