Vol. 18, No. 10, October 31, 2024
10.3837/tiis.2024.10.012,
Download Paper (Free):
Abstract
With the continuous advancements in malicious code polymorphism and obfuscation techniques, the performance of traditional machine learning-based detection methods for malware variant detection has gradually declined. Additionally, conventional pre-trained models could adequately capture the contextual semantic information of malicious code and appropriately represent polysemous words. To enhance the efficiency of malware variant detection, this paper proposes the MalEXLNet intelligent semantic analysis and detection architecture for malware. This architecture leverages malware API call sequences and employs an improved pre-training model for semantic vector representation, effectively utilizing the semantic information of API call sequences. It constructs a hybrid deep learning model, CBAM+AttentionBiLSTM, for training and classification prediction. Furthermore, incorporating the KMeansSMOTE algorithm achieves balanced processing of small sample data, ensuring the model maintains robust performance in detecting malicious variants from rare malware families. Comparative experiments on generalized datasets, Ember and Catak, the results show that the proposed MalEXLNet architecture achieves excellent performance in malware classification and detection tasks, with accuracies of 98.85% and 94.46% in the two datasets, and macro-averaged and micro-averaged metrics exceeding 98% and 92%, respectively.
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Cite this article
[IEEE Style]
X. Mao, Y. Zhao, Y. Feng, Y. Hu, "MalEXLNet:A semantic analysis and detection method of malware API sequence based on EXLNet model," KSII Transactions on Internet and Information Systems, vol. 18, no. 10, pp. 3060-3083, 2024. DOI: 10.3837/tiis.2024.10.012.
[ACM Style]
Xuedong Mao, Yuntao Zhao, Yongxin Feng, and Yutao Hu. 2024. MalEXLNet:A semantic analysis and detection method of malware API sequence based on EXLNet model. KSII Transactions on Internet and Information Systems, 18, 10, (2024), 3060-3083. DOI: 10.3837/tiis.2024.10.012.
[BibTeX Style]
@article{tiis:101413, title="MalEXLNet:A semantic analysis and detection method of malware API sequence based on EXLNet model", author="Xuedong Mao and Yuntao Zhao and Yongxin Feng and Yutao Hu and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2024.10.012}, volume={18}, number={10}, year="2024", month={October}, pages={3060-3083}}