Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning
Title: | Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning |
---|---|
Authors: | Jiankun Sun, Xiong Luo, Weiping Wang, Yang Gao, Wenbing Zhao |
Source: | IET Software, Vol 17, Iss 4, Pp 392-404 (2023) |
Publisher Information: | Wiley, 2023. |
Publication Year: | 2023 |
Collection: | LCC:Computer software |
Subject Terms: | learning (artificial intelligence), security of data, systems analysis, Computer software, QA76.75-76.765 |
More Details: | Abstract Recent developments in the field of Internet of things (IoT) have aroused growing attention to the security of smart devices. Specifically, there is an increasing number of malicious software (Malware) on IoT systems. Nowadays, researchers have made many efforts concerning supervised machine learning methods to identify malicious attacks. High‐quality labels are of great importance for supervised machine learning, but noises widely exist due to the non‐deterministic production environment. Therefore, learning from noisy labels is significant for machine learning‐enabled Malware identification. In this study, motivated by the symmetric cross entropy with satisfactory noise robustness, the authors propose a robust Malware identification method using temporal convolutional network (TCN). Moreover, word embedding techniques are generally utilised to understand the contextual relationship between the input operation code (opcode) and application programming interface function names. Here, considering the numerous unlabelled samples in real‐world intelligent environments, the authors pre‐train the TCN model on an unlabelled set using a word embedding method, that is, Word2Vec. In the experiments, the proposed method is compared with several traditional statistical methods and more recent neural networks on a synthetic Malware dataset and a real‐world dataset. The performance comparisons demonstrate the better performance and noise robustness of their proposed method, especially that the proposed method can yield the best identification accuracy of 98.75% in real‐world scenarios. |
Document Type: | article |
File Description: | electronic resource |
Language: | English |
ISSN: | 1751-8814 1751-8806 |
Relation: | https://doaj.org/toc/1751-8806; https://doaj.org/toc/1751-8814 |
DOI: | 10.1049/sfw2.12137 |
Access URL: | https://doaj.org/article/9ac01bd31dd54f1a9379eb52a530acd8 |
Accession Number: | edsdoj.9ac01bd31dd54f1a9379eb52a530acd8 |
Database: | Directory of Open Access Journals |
ISSN: | 17518814 17518806 |
---|---|
DOI: | 10.1049/sfw2.12137 |
Published in: | IET Software |
Language: | English |