A Study On Deep Learning Approaches Over Malware Detection
A Study On Deep Learning Approaches Over Malware Detection
2
Assistant Professor, Department of Computer Science and Engineering, SRM Institute of Science and Technology,
Kattankulathur, Chennai, India. E Mail: [email protected]
feature vector is employed for coaching and combination of neurons with multiple layers of neurons
classi¿cation through machine learning approach . Neural network architecture of DL is combination of
[19].DL is known as hidden boxing of AI [8]and it also neuron arranged as various layers . where in multiple
comprises of many additional advantage that machine hidden layers are in between input and out layers.
learning fail to carry over. These are various surveys
which projects the need of DL in various security Convolutional Neural Network (CNN)
threat. [15]CNN though evolved in later 80’s due to the
II.DEEP LEARNING hardware limitations for the computation. In 90’s
gradient based algorithm was used with CNN and
A Introduction output expected was great. With respect to 2D and 3D
AI has a major impact in the emerging technology. images CNN absorbs the exact shape and dimensions
There are few subsets of AI named as Machine of the figure and improves dimensionality. CNN are
Learning-which will be as an introductory for Deep trained based in gradient based learning algorithm.
Learning[15].DL consist of neurons which are Feature extractor and classifier are the most important
interconnected. Deep Learning is the AI’s most features of CNN. The steps followed in CNN to extract
important technology which is composed of collection optimal output are Convolution followed by max
of neurons. Structure of Neural Network is processed pooling which is followed by flattening which finally
using Connected layers. A network of neuron is formed evolves the optimal solution. Pooling is normally
by multiple layers as such input layer, output layer and dividing the image into small piece of data. CNN helps
hidden layer. All the layer in between input and output the machine in feature exaction. The feature
layers are mentioned as hidden layer. The network propagation is from higher layer to lowest layer. The
joining more than two layers is represented as deep. final layer of CNN performs as the input of fully
Neurons are connected with each other. The strength of connected layers.
the signal given by input layer to the next layer is based
on the weight , bias and activation function. More the
level of layer more the complex learning in neural
system.
Authorized licensed use limited to: SRM University. Downloaded on March 15,2021 at 04:57:31 UTC from IEEE Xplore. Restrictions apply.
2020 IEEE INTERNATIONAL CONFERENCE ON
ADVANCES AND DEVELOPMENTS IN ELECTRICAL AND ELECTRONICS ENGINEERING (ICADEE 2020)
III MALWARE
Static Analysis
A Classification
[8]Malware is one of the program which infects This is also mentioned as static code[19]. Used in
program. The Most common classification of Malware software debugging without executing the program.
are: Dynamic Analysis
Types of Feature Dama Area of Dynamic analysis is used in testing its behaviour and
Malware ge Applicat
ion
learns its functionality[19].This may also comprise of
Virus[8],[3 Creates Performa • Contag IP address, domain name and so on.
] infection nce ious Hybrid Analysis
without Degradati threat.
the on This is the combination of both the static and dynamic
awarenes analysing technique .Here both software debugging
s of User and testing the functionality of the software is done.
Worms[8], Standalo Issue in • Contag
[26] ne Storage ious Factors STATIC DYNAMIC HYBRID
Maliciou Network threat Analysis Analysis Analysis
s performa Examin Without With execution Tight
software nce es executio Integratio
Trojan[8],[ Takes Steals • Maske n n of both
3] unauthori Password d threat Tools Attack Network Mobile
sed Money and modelin scanner,Sniffer sand
control of theft/File techniqu g, ,Fuzz box,Andr
computer modificat e Source tester,digital ubis
ion. code forensic
Rootkit[8], Masking Steals • Maske analyser
[23] technique Password d threat ,
Install Obfusca
keylogger ted code
. detectio
Spyware Keeps Some • Financi n
track of Captures al Accurac High Low Better
user entire Threat y level than static
system network and
without Mis usage dynamic
their of Target Cannot Able to detect Able to
knowled Encryptio Code detect new /Unknown detect
ge n key Executi new one malware new
Keylogger A typical Used in • Financi on malware malware
class of online al Limitati Limited More time and High cost
Spyware forgeries. Threat ons signatur power
record Steal user e and consumption
keystroke name can
s, browse detect
cookies existing
and files malware
on the Table II: Comparison of Analysis technique
drive to
assemble C Malware detection Approach
personal Malware detection is classified into two broad category
details Signature based and Heuristic based. Signature based
detection approach is further classified into hash
signature and byte signature. Heuristic based detection
Table:I Classification and applications of malware approach is classified into static and dynamic
B Malware Analysis Technique techniques.[15] ,[23] Signature based helps to track
down the detail log of system and helps in classifying
Malware analysis technique enhance user from security malicious program. Heuristic based detection method
threat over various attacks by the malware[19].There used rules or algorithm to detect malicious program.
are three major classification in malware analysis.
They are static, dynamic and hybrid.
Authorized licensed use limited to: SRM University. Downloaded on March 15,2021 at 04:57:31 UTC from IEEE Xplore. Restrictions apply.
2020 IEEE INTERNATIONAL CONFERENCE ON
ADVANCES AND DEVELOPMENTS IN ELECTRICAL AND ELECTRONICS ENGINEERING (ICADEE 2020)
[24]Backdoor, Dynamic API call 99.8% Table IV: Deep Learning Algorithm classification.
analysis
Reference:
Worm,Packed, sequence
PUP,and
Trojan [1] Ankur Singh Bist Kateryna Chumachenko. “Machine
Learning Methods for Malware Detection and Classification”
[24]Backdoor, Hybrid API call 94.9% International Journal of Computer Science and Information
Worm, analysis Security (IJCSIS), Vol. 16, No. 3, March 2018.
Packed,PUP, sequence
and [2] A. L. Buczak and E. Guven, “A survey of data mining and
Trojan machine learning methods for cyber security intrusion
detection,” IEEE Communications. Surveys Tuts., vol. 18,
Table:III Malware detection -Static, Dynamic and no. 2, pp. 1153–1176, 2nd Quart., 2016.
Hybrid analysis
[3] D. Castelvecchi, “Can we open the black box of AI?”
D Deep Learning Algorithms in Malware detection Nature News, vol. 538, no. 7623, p. 20, 2016.
[1]The most popular deep learning algorithms used in
detection of infections are SVM, Random forest, Naive [4] Dolly Uppal , Vishakha Mehra and Vinod Verma , Basic
bayes, Multi-layer perceptron, KNN, Ada Boost and survey on Malware Analysis, Tools and Techniques ,
International Journal on Computational Sciences &
Decision tree. But then the algorithm that are most
Applications (IJCSA) Vol.4, No.1, February 2014
efficient in detection is Restricted Boltzman Machine
(RBM),CNN,RNN,DBN-Deep Belief Network and [5] Erkam Guresen a*, Gulgun Kayakutlu, procedia
Auto encoder. Activation function is implemented in Definition of artificial neural networks with comparison to
CNN to transform the summed weighted input to other networks , Computer Science 3 (2011) 426–433
output. [6] E. Hodo, X. Bellekens, A. Hamilton, C. Tachtatzis, and
R. Atkinson, “Shallow and deep networks intrusion detection
Conclusion
system: A taxonomy and survey,” arXiv preprint
Deep Learning being extension of machine learning
arXiv:1701.02145, 2017
follows various methodologies. Various algorithm and
infection category in discussed. Infection free data is [7] Jun Feng Xie , F. Richard Yu , Fellow, IEEE, Tao Huang
the major goal in data transmission. In this paper it is , Renchao Xie , Jiang Liu A Survey of Machine Learning
been discussed the algorithms of DL over malware Techniques Applied to Software De¿ned Networking (SDN):
Research Issues and Challenges, IEEE
detection. This paper describes impact of the various COMMUNICATIONS SURVEYS & TUTORIALS, VOL.
algorithm on detecting the infections 21, NO. 1, FIRST QUARTER 2019
Authorized licensed use limited to: SRM University. Downloaded on March 15,2021 at 04:57:31 UTC from IEEE Xplore. Restrictions apply.
2020 IEEE INTERNATIONAL CONFERENCE ON
ADVANCES AND DEVELOPMENTS IN ELECTRICAL AND ELECTRONICS ENGINEERING (ICADEE 2020)
[13] G. A. N. Mohamed and N. B. Ithnin, “Survey on [27] A. Zaki and B. Humphrey, “Unveiling the kernel :
Representation Techniques for Malware Detection System,” Rootkit discovery using selective automated kernel memory
Am. J. Appl. Sci., vol. 14, no. 11, pp. 1049–1069, 2017. differencing,” Virus Bull., no. September, pp. 239–256, 2014
[14].Mohana, Dr.S.M.Jagatheesan Survey on Permission [28] Md Zahangir Alom 1,*, Tarek M. Taha 1, Chris
Based Android Malware Detection Techniques, IJEDR 2019 Yakopcic A State-of-the-Art Survey on Deep Learning
| Volume 7, Issue 3 | ISSN: 2321-9939 Theory and Architectures, Published: 5 March 2019 MDPI-
Electronics
[15] Mohammed Harun Babu R, Vinayakumar R, Soman KP
,A short review on Applications of Deep learning for Cyber [29] A Survey of Machine Learning Techniques Applied to
security Software Defined Networking (SDN): Research Issues and
Challenges" , IEEE Communications Surveys & Tutorials,
2018
[16] Mohammed Harun Babu R, Vinayakumar R, Soman KP,
A short review on Applications of Deep learning for Cyber
security, arXiv:1812.06292
Authorized licensed use limited to: SRM University. Downloaded on March 15,2021 at 04:57:31 UTC from IEEE Xplore. Restrictions apply.