DeepAI AI Chat
Log In Sign Up

Representation learning with function call graph transformations for malware open set recognition

by   Jingyun Jia, et al.
Florida Institute of Technology

Open set recognition (OSR) problem has been a challenge in many machine learning (ML) applications, such as security. As new/unknown malware families occur regularly, it is difficult to exhaust samples that cover all the classes for the training process in ML systems. An advanced malware classification system should classify the known classes correctly while sensitive to the unknown class. In this paper, we introduce a self-supervised pre-training approach for the OSR problem in malware classification. We propose two transformations for the function call graph (FCG) based malware representations to facilitate the pretext task. Also, we present a statistical thresholding approach to find the optimal threshold for the unknown class. Moreover, the experiment results indicate that our proposed pre-training process can improve different performances of different downstream loss functions for the OSR problem.


Deep Learning and Open Set Malware Classification: A Survey

As the Internet is growing rapidly these years, the variant of malicious...

MMF: A loss extension for feature learning in open set recognition

Open set recognition (OSR) is the problem of classifying the known class...

Self-supervised Detransformation Autoencoder for Representation Learning in Open Set Recognition

The objective of Open set recognition (OSR) is to learn a classifier tha...

Feature Decoupling in Self-supervised Representation Learning for Open Set Recognition

Assuming unknown classes could be present during classification, the ope...

Learning a Neural-network-based Representation for Open Set Recognition

Open set recognition problems exist in many domains. For example in secu...

MDENet: Multi-modal Dual-embedding Networks for Malware Open-set Recognition

Malware open-set recognition (MOSR) aims at jointly classifying malware ...

Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security

Despite the potential of Machine learning (ML) to learn the behavior of ...