Generative Adversarial Networks and Image-Based Malware Classification

For efficient malware removal, determination of malware threat levels, and damage estimation, malware family classification plays a critical role. In this paper, we extract features from malware executable files and represent them as images using various approaches. We then focus on Generative Adver...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Nguyen, Huy, Di Troia, Fabio, Ishigaki, Genya, Stamp, Mark
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Nguyen, Huy
Di Troia, Fabio
Ishigaki, Genya
Stamp, Mark
description For efficient malware removal, determination of malware threat levels, and damage estimation, malware family classification plays a critical role. In this paper, we extract features from malware executable files and represent them as images using various approaches. We then focus on Generative Adversarial Networks (GAN) for multiclass classification and compare our GAN results to other popular machine learning techniques, including Support Vector Machine (SVM), XGBoost, and Restricted Boltzmann Machines (RBM). We find that the AC-GAN discriminator is generally competitive with other machine learning techniques. We also evaluate the utility of the GAN generative model for adversarial attacks on image-based malware detection. While AC-GAN generated images are visually impressive, we find that they are easily distinguished from real malware images using any of several learning techniques. This result indicates that our GAN generated images would be of little value in adversarial attacks.
doi_str_mv 10.48550/arxiv.2207.00421
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2207_00421</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2207_00421</sourcerecordid><originalsourceid>FETCH-LOGICAL-a671-43a87c9ff9ecade7222e5f7e490daa8c0ac095b711fb2ba1b3dc3ee72580a0873</originalsourceid><addsrcrecordid>eNotz71OwzAcBHAvDKjwAEz4BRL8EeNkLBEtlVpYukcX--_Kapoiu0rh7SmF6Za7k36MPUhRVrUx4gnpK06lUsKWQlRK3rLFkkZKOMWJ-NxPlDJSxMDf6XQ-pn3mGD1fHbCj4gWZPN9gOCMRbwfkHEN0l-1xvGM3AUOm-_-cse3iddu-FeuP5aqdrws8W1lUGrV1TQgNOXiySikywVLVCA_UTsCJxvRWytCrHrLX3mm69EwtIGqrZ-zx7_YK6T5TPCB9d7-g7grSP0I8RsM</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Generative Adversarial Networks and Image-Based Malware Classification</title><source>arXiv.org</source><creator>Nguyen, Huy ; Di Troia, Fabio ; Ishigaki, Genya ; Stamp, Mark</creator><creatorcontrib>Nguyen, Huy ; Di Troia, Fabio ; Ishigaki, Genya ; Stamp, Mark</creatorcontrib><description>For efficient malware removal, determination of malware threat levels, and damage estimation, malware family classification plays a critical role. In this paper, we extract features from malware executable files and represent them as images using various approaches. We then focus on Generative Adversarial Networks (GAN) for multiclass classification and compare our GAN results to other popular machine learning techniques, including Support Vector Machine (SVM), XGBoost, and Restricted Boltzmann Machines (RBM). We find that the AC-GAN discriminator is generally competitive with other machine learning techniques. We also evaluate the utility of the GAN generative model for adversarial attacks on image-based malware detection. While AC-GAN generated images are visually impressive, we find that they are easily distinguished from real malware images using any of several learning techniques. This result indicates that our GAN generated images would be of little value in adversarial attacks.</description><identifier>DOI: 10.48550/arxiv.2207.00421</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Learning</subject><creationdate>2022-06</creationdate><rights>http://creativecommons.org/licenses/by/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,777,882</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2207.00421$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2207.00421$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Nguyen, Huy</creatorcontrib><creatorcontrib>Di Troia, Fabio</creatorcontrib><creatorcontrib>Ishigaki, Genya</creatorcontrib><creatorcontrib>Stamp, Mark</creatorcontrib><title>Generative Adversarial Networks and Image-Based Malware Classification</title><description>For efficient malware removal, determination of malware threat levels, and damage estimation, malware family classification plays a critical role. In this paper, we extract features from malware executable files and represent them as images using various approaches. We then focus on Generative Adversarial Networks (GAN) for multiclass classification and compare our GAN results to other popular machine learning techniques, including Support Vector Machine (SVM), XGBoost, and Restricted Boltzmann Machines (RBM). We find that the AC-GAN discriminator is generally competitive with other machine learning techniques. We also evaluate the utility of the GAN generative model for adversarial attacks on image-based malware detection. While AC-GAN generated images are visually impressive, we find that they are easily distinguished from real malware images using any of several learning techniques. This result indicates that our GAN generated images would be of little value in adversarial attacks.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Learning</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz71OwzAcBHAvDKjwAEz4BRL8EeNkLBEtlVpYukcX--_Kapoiu0rh7SmF6Za7k36MPUhRVrUx4gnpK06lUsKWQlRK3rLFkkZKOMWJ-NxPlDJSxMDf6XQ-pn3mGD1fHbCj4gWZPN9gOCMRbwfkHEN0l-1xvGM3AUOm-_-cse3iddu-FeuP5aqdrws8W1lUGrV1TQgNOXiySikywVLVCA_UTsCJxvRWytCrHrLX3mm69EwtIGqrZ-zx7_YK6T5TPCB9d7-g7grSP0I8RsM</recordid><startdate>20220608</startdate><enddate>20220608</enddate><creator>Nguyen, Huy</creator><creator>Di Troia, Fabio</creator><creator>Ishigaki, Genya</creator><creator>Stamp, Mark</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20220608</creationdate><title>Generative Adversarial Networks and Image-Based Malware Classification</title><author>Nguyen, Huy ; Di Troia, Fabio ; Ishigaki, Genya ; Stamp, Mark</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a671-43a87c9ff9ecade7222e5f7e490daa8c0ac095b711fb2ba1b3dc3ee72580a0873</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Learning</topic><toplevel>online_resources</toplevel><creatorcontrib>Nguyen, Huy</creatorcontrib><creatorcontrib>Di Troia, Fabio</creatorcontrib><creatorcontrib>Ishigaki, Genya</creatorcontrib><creatorcontrib>Stamp, Mark</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Nguyen, Huy</au><au>Di Troia, Fabio</au><au>Ishigaki, Genya</au><au>Stamp, Mark</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Generative Adversarial Networks and Image-Based Malware Classification</atitle><date>2022-06-08</date><risdate>2022</risdate><abstract>For efficient malware removal, determination of malware threat levels, and damage estimation, malware family classification plays a critical role. In this paper, we extract features from malware executable files and represent them as images using various approaches. We then focus on Generative Adversarial Networks (GAN) for multiclass classification and compare our GAN results to other popular machine learning techniques, including Support Vector Machine (SVM), XGBoost, and Restricted Boltzmann Machines (RBM). We find that the AC-GAN discriminator is generally competitive with other machine learning techniques. We also evaluate the utility of the GAN generative model for adversarial attacks on image-based malware detection. While AC-GAN generated images are visually impressive, we find that they are easily distinguished from real malware images using any of several learning techniques. This result indicates that our GAN generated images would be of little value in adversarial attacks.</abstract><doi>10.48550/arxiv.2207.00421</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2207.00421
ispartof
issn
language eng
recordid cdi_arxiv_primary_2207_00421
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Learning
title Generative Adversarial Networks and Image-Based Malware Classification
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T00%3A31%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Generative%20Adversarial%20Networks%20and%20Image-Based%20Malware%20Classification&rft.au=Nguyen,%20Huy&rft.date=2022-06-08&rft_id=info:doi/10.48550/arxiv.2207.00421&rft_dat=%3Carxiv_GOX%3E2207_00421%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true