Skip to main content

Malware Detection Using Artificial Neural Networks

  • Conference paper
  • First Online:
Advances in Computer Science for Engineering and Education II (ICCSEEA 2019)

Abstract

This paper deals with improvement of malware protection efficiency. The analysis of applied scientific researches devoted to creation of malware protection systems suggests that the improvement of mathematical tools using modern neural network models based on deep neural networks is a promising trend in the development of malware detection systems. Also, the results of analysis have determined the need to create a development method for the deep neural network architecture suitable for use within the modern malware detection means. As part of the study, a method for developing a deep neural network architecture designed to detect malicious software has been suggested. In contrast to the existing methods, it helps avoid long-term numerical experiments to determine the expediency of application of the neural network model and optimize its structural parameters during the development. At the same time, multiple experiments conducted using Microsoft BIG-2015 malware database have shown that the method constructs a neural network model that provides a detection error commensurate with the error of modern malware detection systems. Prospective research is related to the adaptation of the suggested method for the application of deep neural networks in behaviour analysers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmadi, M., Ulyanov, D., Semenov, S., Trofimov, M., Giacinto, G.: Novel feature extraction, selection and fusion for effective malware family classification. In: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy (CODASPY 2016), New York, NY, USA, pp. 183–194 (2016)

    Google Scholar 

  2. Akhmetov, B.A., Lakhno, V.B., Akhmetov, B.C., Alimseitova, Z.: Development of sectoral intellectualized expert systems and decision making support systems in cybersecurity. In: Advances in Intelligent Systems and Computing, 2nd Computational Methods in Systems and Software (CoMeSySo), vol. 860, pp. 162–171 (2018). https://doi.org/10.1007/978-3-030-00184-1_15

  3. Artemenko, A.V., Golovko, V.A.: Analysis of neural network computer virus recognition methods. Molodezhnyiy innovatsionnyiy forum «INTRI», GU «BelISA», Minsk, Belorus, 239 p. (2010). (in Russian)

    Google Scholar 

  4. Asiru, O.F., Dlamini, M.T., Asiru, J.M.B.: Application of artificial intelligence for detecting derived viruses. In: 16th European Conference on Cyber Warfare and Security (ECCWS 2017), University College Dublin, Dublin, Ireland, 29–30 June 2017, pp. 217–227 (2017)

    Google Scholar 

  5. Bapiyev, I.M., Aitchanov, B.H., Tereikovskyi, I.A., Tereikovska, L.A., Korchenko, A.A.: Deep neural networks in cyber attack detection systems. Int. J. Civil Eng. Technol. (IJCIET) 8(11), 1086–1092 (2017)

    Google Scholar 

  6. Dychka, I., Tereikovskyi, I., Tereikovska, L., Pogorelov, V., Mussiraliyeva, S.: Deobfuscation of computer virus malware code with value state dependence graph. In: Advances in Intelligent Systems and Computing, pp. 370–379 (2018). https://doi.org/10.1007/978-3-319-91008-6

  7. Falaye, A.A., Oluyemi, E.S., Victor, A.N., Uchenna, U.C., Ogedengbe, O., Ale, S.: Parametric equation for capturing dynamics of cyber attack malware transmission with mitigation on computer network. Int. J. Math. Sci. Comput. (IJMSC) 3(4), 37–51 (2017). https://doi.org/10.5815/ijmsc.2017.04.04

  8. Hu, Z., Tereykovskiy, I.A., Tereykovska, L.O., Pogorelov, V.V.: Determination of structural parameters of multilayer perceptron designed to estimate parameters of technical systems. Int. J. Intell. Syst. Appl. (IJISA) 9(10), 57–62 (2017). https://doi.org/10.5815/ijisa.2017.10.07

    Article  Google Scholar 

  9. Korchenko, A., Tereykovskiy, I., Karpinskiy, N., Tynymbayev, S.: Neural network models, methods and tools for assessing the security parameters of internet-oriented information systems. In: TOV NashFormat, Kiev, Ukraine, 275 p. (2016). (in Russian)

    Google Scholar 

  10. Lakhno, V., Malyukov, V., Parkhuts, L., Buriachok, V., Satzhanov, B., Tabylov, A.: Funding model for port information system cyber security facilities with incomplete Hacker. J. Theor. Appl. Inf. Technol. 96(13), 4215–4225 (2018)

    Google Scholar 

  11. Rudenko, O.H., Bodianskyi, Ye.: Artificial neural networks, Kharkiv, Kompaniia SMIT, 404 p. (2016). (in Ukranian)

    Google Scholar 

  12. Shah, S., Jani, H., Shetty, S., Bhowmick, K.: Virus detection using artificial neural networks. Int. J. Comput. Appl. 84(5), 17–23 (2013)

    Google Scholar 

  13. Sharma, S.: Design and implementation of malware detection scheme. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 10(8), 58–66 (2018). https://doi.org/10.5815/ijcnis.2018.08.07

    Article  Google Scholar 

  14. Sujyothi, A., Acharya, S.: Dynamic malware analysis and detection in virtual environment. Int. J. Modern Educ. Comput. Sci. (IJMECS) 9(3), 48–55 (2017). https://doi.org/10.5815/ijmecs.2017.03.06

    Article  Google Scholar 

  15. Tahir, R.: A study on malware and malware detection techniques. Int. J. Educ. Manag. Eng. (IJEME) 8(2), 20–30 (2018). https://doi.org/10.5815/ijeme.2018.02.03

    Article  Google Scholar 

  16. Tereykovska, L., Tereykovskiy, I., Aytkhozhaeva, E., Tynymbayev, S., Imanbayev, A.: Encoding of neural network model exit signal, that is devoted for distinction of graphical images in biometric authenticate systems. News Natl. Acad. Sci. Repub. Kaz. Ser. Geol. Tech. Sci. 6(426), 217–224 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ihor Tereikovskyi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dychka, I., Chernyshev, D., Tereikovskyi, I., Tereikovska, L., Pogorelov, V. (2020). Malware Detection Using Artificial Neural Networks. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education II. ICCSEEA 2019. Advances in Intelligent Systems and Computing, vol 938. Springer, Cham. https://doi.org/10.1007/978-3-030-16621-2_1

Download citation

Publish with us

Policies and ethics