Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2022, 5(8); doi: 10.25236/AJCIS.2022.050814.

Research and Application of Malware Classification Method Based on LSTM

Author(s)

Bochun Hu, Yuqing Yang, Jinghao Wei, Bin Wu

Corresponding Author:
Bochun Hu
Affiliation(s)

School of Computer Science and Technology, Guizhou University, Guiyang, Guizhou, 550025, China

Abstract

Information technology enhances efficiency and introduces the threat of malware. A typical means of destruction, malware affects the operational security of information systems and poses certain risks to human life, production, and social operations. One of the key research directions in the field of information security is the identification and classification of malware. Currently, mainstream malware analysis and identification methods fall into static and dynamic categories. As a result of obfuscated system calls, it is difficult to detect malware using static analysis, and traditional dynamic analysis methods based on local features are not sufficiently accurate. This paper combines sequence-based LSTM neural networks with learning algorithms for traditional API call features to study malware classification. Furthermore, this paper discusses the idea of hybrid classification based on LSTM and expands the research in this area to some extent. As a result of the research presented in this paper, dynamic analysis and classification of malware are expected to be more effective.

Keywords

LSTM; Malware; API call features

Cite This Paper

Bochun Hu, Yuqing Yang, Jinghao Wei, Bin Wu. Research and Application of Malware Classification Method Based on LSTM. Academic Journal of Computing & Information Science (2022), Vol. 5, Issue 8: 95-100. https://doi.org/10.25236/AJCIS.2022.050814.

References

[1] Liwei Wang, 123, Jiankun Sun, 123, Xiong Luo, 123, Xi Yang. Transferable Features from 1D-Convolutional Network for Industrial Malware Classification [J]. Computer Modeling in Engineering & Sciences, 2022,130(2).

[2] Kakelli Anil Kumar, Kaustubh Kumar, Nag Lohith Chiluka. Deep learning models for multi-class malware classification using Windows exe API calls [J]. International Journal of Critical Computer-Based Systems,2022,10(3).

[3] Mahdavifar Samaneh, Alhadidi Dima, Ghorbani Ali. A. Effective and Efficient Hybrid Android Malware Classification Using Pseudo-Label Stacked Auto-Encoder[J]. Journal of Network and Systems Management,2021,30(1).

[4] Ring Markus, Schlör Daniel, Wunderlich Sarah, Landes Dieter, Hotho Andreas. Malware detection on Windows Audit Logs using LSTMs [J]. Computers & Security,2021(prepublish).

[5] Zhangjie Fu, 123, Yongjie Ding, Musaazi Godfrey. An LSTM-Based Malware Detection Using Transfer Learning [J]. Journal of Cyber Security, 2021, 3(1).

[6] Barath Narayanan Narayanan, Venkata Salini Priyamvada Davuluru. Ensemble Malware Classification System Using Deep Neural Networks [J]. Electronics,2020,9(5).

[7] John Wade. Arbitration of Matrimonial Property Disputes [J]. Bond Law Review,2019.

[8] Stegman Michael J. Matrimonial property in the American states: choice-of-law and conflict-of-laws issues[J]. Trusts & Trustees,2019,25(1).

[9] Juma Katarina. Family Law Digest: Matrimonial Property [M].African Books Collective:2009-01-01.