DeepMal4J: Java Malware Detection Employing Deep Learning

作者: Pallavi Kumari Jha , Prem Shankar , V. G. Sujadevi , P. Prabhaharan

DOI: 10.1007/978-981-13-5826-5_30

关键词: MalwareGeneral-purpose programming languageMachine learningComputer scienceDeep learningLong short term memoryMalware analysisArtificial intelligenceArtificial neural networkJava

摘要: Java is a cross-platform general purpose programming language. Hence, any Java based malware becomes a cross-platform threat. Since 3 Billion devices run Java, it is a serious threat. Currently, there is very little research done in the area of detection of Java malwares. As deep learning recently has proven to be effective in malware detection, we experimented with deep learning algorithms for detecting Java based malware. We name it DeepMal4J and evaluated using Long Short Term Memory (LSTM) and Gated Recurrent Unit (GRU) …

参考文章(19)
Chandra Krintz, Giovanni Vigna, Sunil Soman, Detecting malicious java code using virtual machine auditing usenix security symposium. pp. 11- 11 ,(2003)
Nikitha Ganesh, Fabio Di Troia, Visaggio Aaron Corrado, Thomas H. Austin, Mark Stamp, Static Analysis of Malicious Java Applets international workshop on security. pp. 58- 63 ,(2016) , 10.1145/2875475.2875477
Guillaume Gravier, Vedran Vukotić, Christian Raymond, Is it time to switch to Word Embedding and Recurrent Neural Networks for Spoken Language Understanding conference of the international speech communication association. pp. 130- 134 ,(2015)
Razvan Pascanu, Jack W. Stokes, Hermineh Sanossian, Mady Marinescu, Anil Thomas, Malware classification with recurrent networks international conference on acoustics, speech, and signal processing. pp. 1916- 1920 ,(2015) , 10.1109/ICASSP.2015.7178304
Joshua Saxe, Konstantin Berlin, Deep neural network based malware detection using two dimensional binary program features international conference on malicious and unwanted software. pp. 11- 20 ,(2015) , 10.1109/MALWARE.2015.7413680
Çaglar Gülçehre, Yoshua Bengio, Yoshua Bengio, Yoshua Bengio, KyungHyun Cho, Junyoung Chung, Empirical evaluation of gated recurrent neural networks on sequence modeling arXiv: Neural and Evolutionary Computing. ,(2014)
Ilsun You, Kangbin Yim, Malware Obfuscation Techniques: A Brief Survey broadband and wireless computing, communication and applications. pp. 297- 300 ,(2010) , 10.1109/BWCCA.2010.85
Ekta Gandotra, Divya Bansal, Sanjeev Sofat, Malware Analysis and Classification: A Survey Journal of Information Security. ,vol. 5, pp. 56- 64 ,(2014) , 10.4236/JIS.2014.52006
Sepp Hochreiter, Jürgen Schmidhuber, Long short-term memory Neural Computation. ,vol. 9, pp. 1735- 1780 ,(1997) , 10.1162/NECO.1997.9.8.1735
Paul V. Gestwicki, Bharat Jayaraman, JIVE: java interactive visualization environment conference on object-oriented programming systems, languages, and applications. pp. 226- 228 ,(2004) , 10.1145/1028664.1028762