Word Embedding Techniques for Malware Evolution Detection

03/07/2021
by   Sunhera Paul, et al.
0

Malware detection is a critical aspect of information security. One difficulty that arises is that malware often evolves over time. To maintain effective malware detection, it is necessary to determine when malware evolution has occurred so that appropriate countermeasures can be taken. We perform a variety of experiments aimed at detecting points in time where a malware family has likely evolved, and we consider secondary tests designed to confirm that evolution has actually occurred. Several malware families are analyzed, each of which includes a number of samples collected over an extended period of time. Our experiments indicate that improved results are obtained using feature engineering based on word embedding techniques. All of our experiments are based on machine learning models, and hence our evolution detection strategies require minimal human intervention and can easily be automated.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/04/2021

Machine Learning for Malware Evolution Detection

Malware evolves over time and antivirus must adapt to such evolution. He...
research
03/07/2021

A Comparison of Word2Vec, HMM2Vec, and PCA2Vec for Malware Classification

Word embeddings are often used in natural language processing as a means...
research
03/03/2021

Malware Classification Using Long Short-Term Memory Models

Signature and anomaly based techniques are the quintessential approaches...
research
12/21/2021

Longitudinal Study of the Prevalence of Malware Evasive Techniques

By their very nature, malware samples employ a variety of techniques to ...
research
06/27/2022

Multifamily Malware Models

When training a machine learning model, there is likely to be a tradeoff...
research
09/23/2020

Dataset Optimization Strategies for MalwareTraffic Detection

Machine learning is rapidly becoming one of the most important technolog...
research
04/04/2021

Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown

The malware and botnet phenomenon is among the most significant threats ...

Please sign up or login with your details

Forgot password? Click here to reset