Malware classification algorithm using advanced Word2vec-based Bi-LSTM for ground control stations

Yunsick Sung, Sejun Jang, Young Sik Jeong, Jong Hyuk (James J.). Park

Research output: Contribution to journalArticlepeer-review

34 Scopus citations

Abstract

Recently, Internet of Drones (IoD) are issued to utilize the diverse kinds of drones for leisure, education and so on. Researchers study to prevent the situations that drones are disabled by cyber-attackers by embedding malwares into the drones and Ground Control Stations (GCS). Therefore, it is required to protect the malwares considering the diverse kinds of features of the drones and GCSs. Signature-based detection approaches are traditionally utilized. However, given that those approaches only scan files partially, some of malwares are not detected. This paper proposes a novel method for finding the malwares in GCSs that utilizes a fastText model to create lower-dimension vectors than those the vectors by one-hot encoding and a bidirectional LSTM model to analyze the correlation with sequential opcodes. In addition, API function names are utilized to increase the classification accuracy of the sequential opcodes. In the experiments, the Microsoft malware classification challenge dataset was utilized and the malwares in the dataset were classified by family types. The proposed method showed the performance improvement of 1.87% comparing with the performance by a one-hot encoding-based approach. When the proposed method was compared with a similar decision tree-based malware detection approach, the performance of the proposed method was improved by 0.76%.

Original languageEnglish
Pages (from-to)342-348
Number of pages7
JournalComputer Communications
Volume153
DOIs
StatePublished - 1 Mar 2020

Keywords

  • FastText
  • Ground control station
  • Internet of Drone
  • Long short-term memory
  • Malware

Fingerprint

Dive into the research topics of 'Malware classification algorithm using advanced Word2vec-based Bi-LSTM for ground control stations'. Together they form a unique fingerprint.

Cite this