Detailed Information

Cited 161 time in webofscience Cited 231 time in scopus
Metadata Downloads

Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Jin-Young-
dc.contributor.authorBu, Seok-Jun-
dc.contributor.authorCho, Sung-Bae-
dc.date.accessioned2024-12-03T02:01:01Z-
dc.date.available2024-12-03T02:01:01Z-
dc.date.issued2018-09-
dc.identifier.issn0020-0255-
dc.identifier.issn1872-6291-
dc.identifier.urihttps://scholarworks.gnu.ac.kr/handle/sw.gnu/73648-
dc.description.abstractDetecting malicious software (malware) is important for computer security. Among the different types of malware, zero-day malware is problematic because it cannot be removed by antivirus systems. Existing malware detection mechanisms use stored malware characteristics, which hinders detecting zero-day attacks where altered malware is generated to avoid detection by antivirus systems. To detect malware including zero-day attacks robustly, this paper proposes a novel method called transferred deep-convolutional generative adversarial network (tDCGAN), which generates fake malware and learns to distinguish it from real malware. The data generated from a random distribution are similar but not identical to the real data: it includes modified features compared with real data. The detector learns various malware features using real data and modified data generated by the tDCGAN based on a deep autoencoder (DAE), which extracts appropriate features and stabilizes the GAN training. Before training the GAN, the DAE learns malware characteristics, produces general data, and transfers this capacity for stable training of the GAN generator. The trained discriminator passes down the ability to capture malware features to the detector, using transfer learning. We show that tDCGAN achieves 95.74% average classification accuracy which is higher than that of other models and increases the learning stability. It is also the most robust against modeled zero-day attacks compared to others. (C) 2018 Elsevier Inc. All rights reserved.-
dc.format.extent20-
dc.language영어-
dc.language.isoENG-
dc.publisherElsevier BV-
dc.titleZero-day malware detection using transferred generative adversarial networks based on deep autoencoders-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1016/j.ins.2018.04.092-
dc.identifier.scopusid2-s2.0-85047653335-
dc.identifier.wosid000441494000006-
dc.identifier.bibliographicCitationInformation Sciences, v.460, pp 83 - 102-
dc.citation.titleInformation Sciences-
dc.citation.volume460-
dc.citation.startPage83-
dc.citation.endPage102-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClasssci-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.subject.keywordAuthorMalicious software-
dc.subject.keywordAuthorZero-day attack-
dc.subject.keywordAuthorGenerative adversarial network-
dc.subject.keywordAuthorAutoencoder-
dc.subject.keywordAuthorTransferlearning-
dc.subject.keywordAuthorRobustness to noise-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Seok-Jun, Buu photo

Seok-Jun, Buu
IT공과대학 (컴퓨터공학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE