Generative Adversarial Networks and Image-Based Malware Classification
For efficient malware removal, determination of malware threat levels, and damage estimation, malware family classification plays a critical role. In this paper, we extract features from malware executable files and represent them as images using various approaches. We then focus on Generative Adver...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Nguyen, Huy Di Troia, Fabio Ishigaki, Genya Stamp, Mark |
description | For efficient malware removal, determination of malware threat levels, and
damage estimation, malware family classification plays a critical role. In this
paper, we extract features from malware executable files and represent them as
images using various approaches. We then focus on Generative Adversarial
Networks (GAN) for multiclass classification and compare our GAN results to
other popular machine learning techniques, including Support Vector Machine
(SVM), XGBoost, and Restricted Boltzmann Machines (RBM). We find that the
AC-GAN discriminator is generally competitive with other machine learning
techniques. We also evaluate the utility of the GAN generative model for
adversarial attacks on image-based malware detection. While AC-GAN generated
images are visually impressive, we find that they are easily distinguished from
real malware images using any of several learning techniques. This result
indicates that our GAN generated images would be of little value in adversarial
attacks. |
doi_str_mv | 10.48550/arxiv.2207.00421 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2207_00421</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2207_00421</sourcerecordid><originalsourceid>FETCH-LOGICAL-a671-43a87c9ff9ecade7222e5f7e490daa8c0ac095b711fb2ba1b3dc3ee72580a0873</originalsourceid><addsrcrecordid>eNotz71OwzAcBHAvDKjwAEz4BRL8EeNkLBEtlVpYukcX--_Kapoiu0rh7SmF6Za7k36MPUhRVrUx4gnpK06lUsKWQlRK3rLFkkZKOMWJ-NxPlDJSxMDf6XQ-pn3mGD1fHbCj4gWZPN9gOCMRbwfkHEN0l-1xvGM3AUOm-_-cse3iddu-FeuP5aqdrws8W1lUGrV1TQgNOXiySikywVLVCA_UTsCJxvRWytCrHrLX3mm69EwtIGqrZ-zx7_YK6T5TPCB9d7-g7grSP0I8RsM</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Generative Adversarial Networks and Image-Based Malware Classification</title><source>arXiv.org</source><creator>Nguyen, Huy ; Di Troia, Fabio ; Ishigaki, Genya ; Stamp, Mark</creator><creatorcontrib>Nguyen, Huy ; Di Troia, Fabio ; Ishigaki, Genya ; Stamp, Mark</creatorcontrib><description>For efficient malware removal, determination of malware threat levels, and
damage estimation, malware family classification plays a critical role. In this
paper, we extract features from malware executable files and represent them as
images using various approaches. We then focus on Generative Adversarial
Networks (GAN) for multiclass classification and compare our GAN results to
other popular machine learning techniques, including Support Vector Machine
(SVM), XGBoost, and Restricted Boltzmann Machines (RBM). We find that the
AC-GAN discriminator is generally competitive with other machine learning
techniques. We also evaluate the utility of the GAN generative model for
adversarial attacks on image-based malware detection. While AC-GAN generated
images are visually impressive, we find that they are easily distinguished from
real malware images using any of several learning techniques. This result
indicates that our GAN generated images would be of little value in adversarial
attacks.</description><identifier>DOI: 10.48550/arxiv.2207.00421</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Learning</subject><creationdate>2022-06</creationdate><rights>http://creativecommons.org/licenses/by/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,777,882</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2207.00421$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2207.00421$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Nguyen, Huy</creatorcontrib><creatorcontrib>Di Troia, Fabio</creatorcontrib><creatorcontrib>Ishigaki, Genya</creatorcontrib><creatorcontrib>Stamp, Mark</creatorcontrib><title>Generative Adversarial Networks and Image-Based Malware Classification</title><description>For efficient malware removal, determination of malware threat levels, and
damage estimation, malware family classification plays a critical role. In this
paper, we extract features from malware executable files and represent them as
images using various approaches. We then focus on Generative Adversarial
Networks (GAN) for multiclass classification and compare our GAN results to
other popular machine learning techniques, including Support Vector Machine
(SVM), XGBoost, and Restricted Boltzmann Machines (RBM). We find that the
AC-GAN discriminator is generally competitive with other machine learning
techniques. We also evaluate the utility of the GAN generative model for
adversarial attacks on image-based malware detection. While AC-GAN generated
images are visually impressive, we find that they are easily distinguished from
real malware images using any of several learning techniques. This result
indicates that our GAN generated images would be of little value in adversarial
attacks.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Learning</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz71OwzAcBHAvDKjwAEz4BRL8EeNkLBEtlVpYukcX--_Kapoiu0rh7SmF6Za7k36MPUhRVrUx4gnpK06lUsKWQlRK3rLFkkZKOMWJ-NxPlDJSxMDf6XQ-pn3mGD1fHbCj4gWZPN9gOCMRbwfkHEN0l-1xvGM3AUOm-_-cse3iddu-FeuP5aqdrws8W1lUGrV1TQgNOXiySikywVLVCA_UTsCJxvRWytCrHrLX3mm69EwtIGqrZ-zx7_YK6T5TPCB9d7-g7grSP0I8RsM</recordid><startdate>20220608</startdate><enddate>20220608</enddate><creator>Nguyen, Huy</creator><creator>Di Troia, Fabio</creator><creator>Ishigaki, Genya</creator><creator>Stamp, Mark</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20220608</creationdate><title>Generative Adversarial Networks and Image-Based Malware Classification</title><author>Nguyen, Huy ; Di Troia, Fabio ; Ishigaki, Genya ; Stamp, Mark</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a671-43a87c9ff9ecade7222e5f7e490daa8c0ac095b711fb2ba1b3dc3ee72580a0873</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Learning</topic><toplevel>online_resources</toplevel><creatorcontrib>Nguyen, Huy</creatorcontrib><creatorcontrib>Di Troia, Fabio</creatorcontrib><creatorcontrib>Ishigaki, Genya</creatorcontrib><creatorcontrib>Stamp, Mark</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Nguyen, Huy</au><au>Di Troia, Fabio</au><au>Ishigaki, Genya</au><au>Stamp, Mark</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Generative Adversarial Networks and Image-Based Malware Classification</atitle><date>2022-06-08</date><risdate>2022</risdate><abstract>For efficient malware removal, determination of malware threat levels, and
damage estimation, malware family classification plays a critical role. In this
paper, we extract features from malware executable files and represent them as
images using various approaches. We then focus on Generative Adversarial
Networks (GAN) for multiclass classification and compare our GAN results to
other popular machine learning techniques, including Support Vector Machine
(SVM), XGBoost, and Restricted Boltzmann Machines (RBM). We find that the
AC-GAN discriminator is generally competitive with other machine learning
techniques. We also evaluate the utility of the GAN generative model for
adversarial attacks on image-based malware detection. While AC-GAN generated
images are visually impressive, we find that they are easily distinguished from
real malware images using any of several learning techniques. This result
indicates that our GAN generated images would be of little value in adversarial
attacks.</abstract><doi>10.48550/arxiv.2207.00421</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.2207.00421 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_2207_00421 |
source | arXiv.org |
subjects | Computer Science - Cryptography and Security Computer Science - Learning |
title | Generative Adversarial Networks and Image-Based Malware Classification |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T00%3A31%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Generative%20Adversarial%20Networks%20and%20Image-Based%20Malware%20Classification&rft.au=Nguyen,%20Huy&rft.date=2022-06-08&rft_id=info:doi/10.48550/arxiv.2207.00421&rft_dat=%3Carxiv_GOX%3E2207_00421%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |