Author
Listed:
- Jinting Zhu
(Cybersecurity Lab, Massey University, Auckland 0632, New Zealand)
- Julian Jang-Jaccard
(Cybersecurity Lab, Massey University, Auckland 0632, New Zealand)
- Amardeep Singh
(Cybersecurity Lab, Massey University, Auckland 0632, New Zealand)
- Paul A. Watters
(Cyberstronomy Pty Ltd., Melbourne 3086, Australia)
- Seyit Camtepe
(Data61, Commonwealth Scientific and Industrial Research Organisation (CSIRO), Epping 1710, Australia)
Abstract
Malware authors apply different techniques of control flow obfuscation, in order to create new malware variants to avoid detection. Existing Siamese neural network (SNN)-based malware detection methods fail to correctly classify different malware families when such obfuscated malware samples are present in the training dataset, resulting in high false-positive rates. To address this issue, we propose a novel task-aware few-shot-learning-based Siamese Neural Network that is resilient against the presence of malware variants affected by such control flow obfuscation techniques. Using the average entropy features of each malware family as inputs, in addition to the image features, our model generates the parameters for the feature layers, to more accurately adjust the feature embedding for different malware families, each of which has obfuscated malware variants. In addition, our proposed method can classify malware classes, even if there are only one or a few training samples available. Our model utilizes few-shot learning with the extracted features of a pre-trained network (e.g., VGG-16), to avoid the bias typically associated with a model trained with a limited number of training samples. Our proposed approach is highly effective in recognizing unique malware signatures, thus correctly classifying malware samples that belong to the same malware family, even in the presence of obfuscated malware variants. Our experimental results, validated by N-way on N-shot learning, show that our model is highly effective in classification accuracy, exceeding a rate >91%, compared to other similar methods.
Suggested Citation
Jinting Zhu & Julian Jang-Jaccard & Amardeep Singh & Paul A. Watters & Seyit Camtepe, 2023.
"Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware,"
Future Internet, MDPI, vol. 15(6), pages 1-22, June.
Handle:
RePEc:gam:jftint:v:15:y:2023:i:6:p:214-:d:1170782
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:15:y:2023:i:6:p:214-:d:1170782. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.