In malware detection, dynamic analysis extracts the runtime behavior of malware samples in a controlled environment and static analysis extracts features using reverse engineering tools. While the former faces the challenges of anti-virtualization and evasive behavior of malware samples, the latter faces the challenges of code obfuscation. To tackle these drawbacks, prior works proposed to develop detection models by aggregating dynamic and static features, thus leveraging the advantages of both approaches. However, simply concatenating dynamic and static features raises an issue of imbalanced contribution due to the heterogeneous dimensions of feature vectors to the performance of malware detection models. Yet, dynamic analysis is a time-consuming task and requires a secure environment, leading to detection delays and high costs for maintaining the analysis infrastructure. In this paper, we first introduce a method of constructing aggregated features via concatenating latent features learned through deep learning with equally-contributed dimensions. We then develop a knowledge distillation technique to transfer knowledge learned from aggregated features by a teacher model to a student model trained only on static features and use the trained student model for the detection of new malware samples. We carry out extensive experiments with a dataset of 86709 samples including both benign and malware samples. The experimental results show that the teacher model trained on aggregated features constructed by our method outperforms the state-of-the-art models with an improvement of up to 2.38% in detection accuracy. The distilled student model not only achieves high performance (97.81% in terms of accuracy) as that of the teacher model but also significantly reduces the detection time (from 70046.6 ms to 194.9 ms) without requiring dynamic analysis.
翻译:在检测恶意软件时,动态分析会提取在受控环境中恶意软件样本的运行时间行为,静态分析则利用反向工程工具提取特征。虽然动态分析面临反虚拟和恶意软件样本蒸发行为的挑战,但后者面临代码模糊的挑战。为解决这些缺陷,先前曾提议通过综合动态和静态特征开发检测模型,从而利用这两种方法的优势。然而,仅仅将动态和静态特征凝结为动态和静态特征,就提出了一个因特性矢量与恶意软件检测模型的性能差异性能不同而造成贡献不平衡的问题。然而,动态分析是一项耗时的任务,需要一个安全的环境,从而导致检测延误,以及维护分析基础设施的高成本。在本文中,我们首先采用一种方法,通过将深层学习所学的隐性能相融合来构建综合特征,从而利用这两种方法的优势。我们随后开发了一种知识蒸馏技术,将教师从汇总特性中学习的知识从一个教师模型转移到一个学生模型,但仅受过静态特征培训的学生模型,并使用经过训练的学生模型来检测新的恶意软件样本的准确性模型。我们用一个经过广泛测试的测试的准确性模型来进行模拟模型,从而在测试模型中进行测试。我们通过测试的18997模型的模型的模型中进行广泛的模型,同时进行广泛的模型进行广泛的实验。我们用一个测试的模型进行广泛的模型进行广泛的实验,在测试的模型进行广泛的模拟的模型进行一项实验。我们制制制制制制制的模型进行一项模型,以制制制制制制制制制制制制制制制的模型。我们制式的模型,以制制制制制制制制制的模型。我们制制的模型进行。我们制制的模型进行广泛的实验,以制制的模型进行。