Emulating malware authors for proactive protection using GANs over a distributed image visualization of dynamic file behavior

07/19/2018
by   Vineeth S. Bhaskara, et al.
0

Malware authors have always been at an advantage of being able to adversarially test and augment their malicious code, before deploying the payload, using anti-malware products at their disposal. The anti-malware developers and threat experts, on the other hand, do not have such a privilege of tuning anti-malware products against zero-day attacks pro-actively. This allows the malware authors to being a step ahead of the anti-malware products, fundamentally biasing the cat and mouse game played by the two parties. In this paper, we propose a way that would enable machine learning based threat prevention models to bridge that gap by being able to tune against a deep generative adversarial network (GAN), which takes up the role of a malware author and generates new types of malware. The GAN is trained over a reversible distributed RGB image representation of known malware behaviors, encoding the sequence of API call ngrams and the corresponding term frequencies. The generated images represent synthetic malware that can be decoded back to the underlying API call sequence information. The image representation is not only demonstrated as a general technique of incorporating necessary priors for exploiting convolutional neural network architectures for generative or discriminative modeling, but also as a visualization method for easy manual software or malware categorization, by having individual API ngram information distributed across the image space. In addition, we also propose using smart-definitions for detecting malwares based on perceptual hashing of these images. Such hashes are potentially more effective than cryptographic hashes that do not carry any meaningful similarity metric, and hence, do not generalize well.

READ FULL TEXT

page 7

page 10

page 13

page 16

page 18

page 19

page 20

research
07/19/2018

Emulating malware authors for proactive protection using GANs over a distributed image visualization of the dynamic file behavior

Malware authors have always been at an advantage of being able to advers...
research
12/14/2020

Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model

Anti-malware engines are the first line of defense against malicious sof...
research
08/09/2021

Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification

Malware is a piece of software that was written with the intent of doing...
research
02/28/2022

Anti-Malware Sandbox Games

We develop a game theoretic model of malware protection using the state-...
research
06/12/2018

Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus

As machine-learning (ML) based systems for malware detection become more...
research
09/23/2021

On The Vulnerability of Anti-Malware Solutions to DNS Attacks

Anti-malware agents typically communicate with their remote services to ...
research
04/04/2018

Developing a K-ary malware using Blockchain

Cyberattacks are nowadays moving rapidly. They are customized, multi-vec...

Please sign up or login with your details

Forgot password? Click here to reset