2018
DOI: 10.3390/e20050390
|View full text |Cite
|
Sign up to set email alerts
|

End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware

Abstract: Malware allegedly developed by nation-states, also known as advanced persistent threats (APT), are becoming more common. The task of attributing an APT to a specific nation-state or classifying it to the correct APT family is challenging for several reasons. First, each nation-state has more than a single cyber unit that develops such malware, rendering traditional authorship attribution algorithms useless. Furthermore, the dataset of such available APTs is still extremely small. Finally, those APTs use state-… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(25 citation statements)
references
References 19 publications
1
15
0
Order By: Relevance
“…This rise in cyber-attacks is due to both the free accessibility of malware varieties on the internet and integrated options available in open source operating systems like back track, Linux, Kali, Parrot, etc. Due to the extreme complicated nature of latest generation malware, conventional security system strategies seem unable to avoid advanced cyber-attacks [7]. Machine learning provides great potential to assist throughout the identification of intervention by stealth malware.…”
Section: Introductionmentioning
confidence: 99%
“…This rise in cyber-attacks is due to both the free accessibility of malware varieties on the internet and integrated options available in open source operating systems like back track, Linux, Kali, Parrot, etc. Due to the extreme complicated nature of latest generation malware, conventional security system strategies seem unable to avoid advanced cyber-attacks [7]. Machine learning provides great potential to assist throughout the identification of intervention by stealth malware.…”
Section: Introductionmentioning
confidence: 99%
“…In Section 3. Deep/Artificial Neural Networks (DNN/ANN) [103], [104], [78], [7], [8] Tree Bagging (TB)…”
Section: Malware Binary Authorship Attributionmentioning
confidence: 99%
“…Continuing this assumption, Meng and Miller [78] explore the use of Deep Neural Networks directly on the binaries' raw bytes without any analysis or feature extraction process. Rosenberg et al [103,104] also consider the use of Artificial Neural Networks for classifying binaries to authors. Alrabaee et al [7,8] use convolutional neural networks to cluster author style and then use a classifier to determine if a piece of malware belongs to an author cluster.…”
Section: Data Modeling Techniquesmentioning
confidence: 99%
“…Understanding the malicious behaviors of different APT families can enhance understanding and resisting APT attacks [2]. To identify families of APT malware samples, the current work analyzes typical malicious malware behaviors of different APT families to distinguish them [2,14]. However, the number of publicly available malware samples from each APT family is small, making it difficult to train a robust classification model through such a small number of samples [15].…”
Section: Introductionmentioning
confidence: 99%