Please use this identifier to cite or link to this item: http://hdl.handle.net/10125/71479

Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning

File Size Format  
0697.pdf 1.02 MB Adobe PDF View/Open

Item Summary

Title:Malware Detection Using Frequency Domain-Based Image Visualization and Deep Learning
Authors:Mohammed, Tajuddin Manhar
Nataraj, Lakshmanan
Chikkagoudar, Satish
Chandrasekaran, Shivkumar
Manjunath, B.S.
Keywords:Machine Learning and Cyber Threat Intelligence and Analytics
deep learning
frequency analysis
image visualization
machine learning
show 1 moremalware detection
show less
Date Issued:05 Jan 2021
Abstract:We propose a novel method to detect and visualize malware through image classification. The executable binaries are represented as grayscale images obtained from the count of N-grams (N=2) of bytes in the Discrete Cosine Transform (DCT) domain and a neural network is trained for malware detection. A shallow neural network is trained for classification, and its accuracy is compared with deep-network architectures such as ResNet that are trained using transfer learning. Neither dis-assembly nor behavioral analysis of malware is required for these methods. Motivated by the visual similarity of these images for different malware families, we compare our deep neural network models with standard image features like GIST descriptors to evaluate the performance. A joint feature measure is proposed to combine different features using error analysis to get an accurate ensemble model for improved classification performance. A new dataset called MaleX which contains around 1 million malware and benign Windows executable samples is created for large-scale malware detection and classification experiments. Experimental results are quite promising with 96% binary classification accuracy on MaleX. The proposed model is also able to generalize well on larger unseen malware samples and the results compare favorably with state-of-the-art static analysis-based malware detection algorithms.
Pages/Duration:10 pages
URI:http://hdl.handle.net/10125/71479
ISBN:978-0-9981331-4-0
DOI:10.24251/HICSS.2021.858
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
https://creativecommons.org/licenses/by-nc-nd/4.0/
Appears in Collections: Machine Learning and Cyber Threat Intelligence and Analytics


Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons