Driven by the high profit, Portable Executable (PE) malware has been consistently evolving in terms of both volume and sophistication. PE malware family classification has gained great attention and a large number of approaches have been proposed. With the rapid development of machine learning techniques and the exciting results they achieved on various tasks, machine learning algorithms have also gained popularity in the PE malware family classification task. Three mainstream approaches that use learning based algorithms, as categorized by the input format the methods take, are image-based, binary-based and disassembly-based approaches. Although a large number of approaches are published, there is no consistent comparisons on those approaches, especially from the practical industry adoption perspective. Moreover, there is no comparison in the scenario of concept drift, which is a fact for the malware classification task due to the fast evolving nature of malware. In this work, we conduct a thorough empirical study on learning-based PE malware classification approaches on 4 different datasets and consistent experiment settings. Based on the experiment results and an interview with our industry partners, we find that (1) there is no individual class of methods that significantly outperforms the others; (2) All classes of methods show performance degradation on concept drift (by an average F1-score of 32.23%); and (3) the prediction time and high memory consumption hinder existing approaches from being adopted for industry usage.
翻译:在高利润驱动下,可移植执行软件恶意软件在数量和复杂程度方面不断演变。PE恶意软件家庭分类引起了极大关注,并提出了大量的办法。随着机器学习技术的迅速发展及其在各种任务上取得的令人兴奋的结果,机器学习算法在PE恶意软件家庭分类任务中也越来越受欢迎。三种使用学习算法的主流方法,按所用输入格式分类,是基于图像、基于二进制和基于拆解的方法。虽然公布了大量的方法,但没有对这些方法进行一致的比较,特别是从实际行业采用的角度来看。此外,由于机器学习技术的迅速发展及其在各种任务上取得的令人振奋人心的结果,机器学习算法在PE恶意软件的家庭分类任务中也越来越受欢迎。在这项工作中,我们根据4种不同输入格式分类法和一致的实验环境,对基于学习的PE软件软件分类方法进行了彻底的经验研究。根据实验结果和与我们行业伙伴的访谈,我们发现(1) 没有一种明显超出现有消费使用率的个别方法,尤其是从实际行业采用的方法;(2) 所有流化和流化方法都显示现有流化方法。