Malware Classification Using Deep Neural Networks: Performance Evaluation and Applications in Edge Devices
Malware Classification Using Deep Neural Networks: Performance Evaluation and Applications in Edge Devices
Abstract - With the increasing extent of malware attacks in detection by sifting through malware samples and deriving
the present day along with the difficulty in detecting modern useful representations.
malware, it is necessary to evaluate the effectiveness and
performance of Deep Neural Networks (DNNs) for malware
classification. Multiple DNN architectures can be designed and
trained to detect and classify malware binaries. Results
demonstrate the potential of DNNs in accurately classifying
malware with high accuracy rates observed across different
malware types. Additionally, the feasibility of deploying these
DNN models on edge devices to enable real-time classification,
particularly in resource-constrained scenarios proves to be
integral to large IoT systems. By optimizing model
architectures and leveraging edge computing capabilities, the
proposed methodologies achieve efficient performance even
with limited resources. This study contributes to advancing
malware detection techniques and emphasizes the significance
of integrating cybersecurity measures for the early detection
of malware and further preventing the adverse effects caused
by such attacks. Optimal considerations regarding the
distribution of security tasks to edge devices are addressed to
ensure that the integrity and availability of large-scale IoT
systems are not compromised due to malware attacks, Fig–1: ML based Malware Classification Flow
advocating for a more resilient and secure digital ecosystem.
IoT devices are complex in nature and are subject to a wide
Key Words: Cybersecurity, Data Protection, Deep Neural variety of cyber-attacks with malware attacks being one of
Networks, IoT Security, Malware Classification, the prominent ones. Additionally with the increasing
Performance Evaluation adoption of IoT devices in industries, these IoT systems will
experience a rise in cyber-attacks. Therefore, it is deemed
1. INTRODUCTION necessary to deploy efficient methodologies to detect and
mitigate the adverse effects which would otherwise be
caused by such malware attacks. According to Quoc-Dung
Combating the constant spread of malware continues to be a
Ngo et al., IoT malware detection techniques can be broadly
major concern in the constantly changing world of
classified into two domains, namely static analysis, and
cybersecurity. The integrity, confidentiality, and availability
dynamic analysis [5].
of digital assets are seriously threatened by malicious
Dynamic analysis includes having to execute the
software, or malware, making accurate malware
binaries and monitor for any malicious activity which could
categorization a critical component of contemporary
potentially infect the real time execution environment. In
security systems. Long used for malware detection,
contrast, static analysis involves analyzing the binaries
traditional signature-based methods are ineffective against
without executing them. [5] The methodologies explored in
fast-evolving and zero-day malware. This calls for the
this paper leverage deep learning techniques to identify
adoption of more advanced methodologies. Deep neural
patterns and classify malware binaries without having to
networks (DNNs), a particularly noteworthy development in
execute them.
deep learning in recent years, have shown significant
Additionally, we cover a crucial topic of
promise in several areas, including image identification,
implementing advanced malware classification algorithms in
natural language processing, and autonomous systems. In
contexts with limited resources. The computational and
the field of malware categorization, its capacity to
memory resources of edge devices, such as Internet of
automatically learn sophisticated patterns and features from
Things (IoT) gadgets and low-powered computer systems,
raw data has attracted interest. DNNs can dramatically
are constrained. For effective and real-time malware
improve the precision and effectiveness of malware
detection at the network edge, it is critical to assess the
applicability of our deep neural network approach in such
1
devices. Therefore, the computation time or the latency to Lanzi et al. [8], which captures generalized interactions of
classify malware binaries is measured once the trained benign applications with operating system resources,
model is obtained. This research intends to advance resulting in a low false positive rate. However, dynamic
cybersecurity procedures by examining the functionality and analysis techniques face challenges in handling execution-
applicability of our DNN-based malware classification driven datasets, security precautions during
methodology. By providing security experts with a cutting- experimentation, and dynamic anti-analysis defenses used
edge tool for malware detection that is early and accurate, by modern malware to evade detection.
our research has the potential to increase the resilience of
digital ecosystems to the ever-increasing cyberthreats. Static Analysis: On the other hand, static approaches
perform analysis without executing the program. The
2. RELATED WORK research literature demonstrates a wide variety of static
analysis methods, with SAFE [11] and SAVE [10] being
Previous research on malware classification can be influential heuristic static malware detection approaches.
broadly categorized into two main approaches: they are, These works proposed using different patterns to detect
malicious content in executable files. Since then, numerous
techniques have emerged based on different malware
attributes, such as the header or body of the Portable
Executable (PE) file, with analysis conducted on bytecode or
by disassembling the code to extract opcodes and other
relevant information. The main challenge in static analysis is
coping with packing and obfuscation. Recently, generic
approaches for the automatic de-obfuscation of obfuscated
programs have been proposed. Additionally, static
techniques have been employed to assess if a detected
malware is like a previously seen variant without performing
costly unpacking.
2
an extra block consisting of a convolutional layer followed by
8 Dinwod Trojan 140
a Max-pooling layer each time to the base model. However,
their model remains relatively shallow. In contrast, our 9 Hex Trojan 140
research delves into exploring deeper CNN architectures for
improved malware classification. 10 Expiro Virus 140
3
4.3 InceptionNetV3 applications because of this design decision, which enables
real-time processing and reduces computational and energy
An improved convolutional neural network architecture expenses. MobileNet Small, which is widely used in edge
called InceptionNetV3, sometimes known as Inception V3, computing applications, demonstrates its usefulness in
was created for image identification applications. It provides enhancing deep learning for mobile and embedded devices.
numerous parallel convolutional layers of various filter sizes
to effectively capture features at various scales and
resolutions, building on the strengths of its forerunners,
InceptionNet and Inception V2. In order to capture both fine-
grained and global characteristics, the "Inception module"
concurrently uses 1x1, 3x3, and 5x5 convolutions.
Meanwhile, "Factorized 7x7" convolutions lessen
computational complexity without sacrificing the receptive Fig -5: MobileNet Architecture
field. 4.5 MobileNet Large
With the use of batch normalization and auxiliary It is a lightweight deep learning architecture designed for
classifiers, it also improves convergence and addresses the efficient image classification on mobile devices. It also utilizes
vanishing gradient issue. Global average pooling minimizes depth wise separable convolutions, a width multiplier, and a
the number of parameters and avoids overfitting. resolution multiplier to reduce computational complexity and
InceptionNetV3 has been widely used for research and model size. Despite its efficiency-focused design, MobileNet
practical applications because of its exceptional performance Large maintains competitive accuracy and is well-suited for
in picture classification, object identification, and visual real-time applications on resource-constrained devices,
recognition tasks. making it a significant advancement in the field of computer
vision.
In summary, MobileNet Small sacrifices some accuracy for
even greater efficiency and compactness, making it ideal for
scenarios where minimizing model size and computational
requirements are critical, while MobileNet Large strikes a
balance between efficiency and accuracy, making it more
suitable for general-purpose mobile vision applications on
devices with moderate resources.
5
[15] M. Ahmadi, D. Ulyanov, S. Semenov, M. Trofimov, and G.
Giacinto, “Novel feature extraction, selection and fusion
for effective malware family classification,” in
Proceedings of the Sixth ACM Conference on Data and
Application Security and Privacy. ACM, 2016, pp. 183–
194.
[16] D. Gibert Llaurado, “Convolutional neural networks for
malware classification,” Master’s thesis, Universitat
Politecnica de Catalunya, 2016