We propose a novel method to detect and visualize malware through image classification. The executable binaries are represented as grayscale images obtained from the count of N-grams (N=2) of bytes in the Discrete Cosine Transform (DCT) domain and a neural network is trained for malware detection. A shallow neural network is trained for classification, and its accuracy is compared with deep-network architectures such as ResNet that are trained using transfer learning. Neither dis-assembly nor behavioral analysis of malware is required for these methods. Motivated by the visual similarity of these images for different malware families, we compare our deep neural network models with standard image features like GIST descriptors to evaluate the performance. A joint feature measure is proposed to combine different features using error analysis to get an accurate ensemble model for improved classification performance. A new dataset called MaleX which contains around 1 million malware and benign Windows executable samples is created for large-scale malware detection and classification experiments. Experimental results are quite promising with 96% binary classification accuracy on MaleX. The proposed model is also able to generalize well on larger unseen malware samples and the results compare favorably with state-of-the-art static analysis-based malware detection algorithms.
翻译:我们建议一种通过图像分类检测和视觉分析恶意软件的新方法。 从 Discrete Cosine 变换(DCT) 域域, 并训练神经网络进行恶意软件检测。 浅神经网络经过分类培训, 其准确性与使用传输学习培训的ResNet等深网络结构进行比较。 这些方法不需要对恶意软件进行拆卸分析或行为分析。 由于不同恶意软件家庭的这些图像的视觉相似性, 我们把这些深神经网络模型与标准图像特征( 如 GIST 描述器) 进行比较, 以评价性能。 提议了一个联合特征测量, 将不同的特征结合起来, 使用错误分析获得准确的共性能模型, 以便改进分类性能。 一个叫做 MaleX 的新数据集, 包含大约100万张恶意和温视窗执行样本, 用于大规模恶意软件检测和分类实验。 实验的结果很有希望用96 % 二进制的图像来对不同的恶意网络模型进行对比。 提议的一个联合特征测量模型, 与更大规模的SOLIX 样本分析。