Malware Detection Using Deep Transferred Generative Adversarial Networks
- Authors
- Kim, Jin-Young; Bu, Seok-Jun; Cho, Sung-Bae
- Issue Date
- Oct-2017
- Publisher
- Springer Verlag
- Keywords
- Malicious software; Zero-day attack; Generative adversarial network; Autoencoder; Transfer learning
- Citation
- Lecture Notes in Computer Science, v.10634, pp 556 - 564
- Pages
- 9
- Indexed
- SCOPUS
- Journal Title
- Lecture Notes in Computer Science
- Volume
- 10634
- Start Page
- 556
- End Page
- 564
- URI
- https://scholarworks.gnu.ac.kr/handle/sw.gnu/73669
- DOI
- 10.1007/978-3-319-70087-8_58
- ISSN
- 0302-9743
1611-3349
- Abstract
- Malicious software is generated with more and more modified features of which the methods to detect malicious software use characteristics. Automatic classification of malicious software is efficient because it does not need to store all characteristic. In this paper, we propose a transferred generative adversarial network (tGAN) for automatic classification and detection of the zero-day attack. Since the GAN is unstable in training process, often resulting in generator that produces nonsensical outputs, a method to pre-train GAN with autoencoder structure is proposed. We analyze the detector, and the performance of the detector is visualized by observing the clustering pattern of malicious software using t-SNE algorithm. The proposed model gets the best performance compared with the conventional machine learning algorithms.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - ETC > Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.