Skip to content

Commit

Permalink
* update 2024-11-23 06:21:57
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Nov 22, 2024
1 parent d64b108 commit 4e8e309
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 1 deletion.
12 changes: 12 additions & 0 deletions arXiv_db/Malware/2024.md
Original file line number Diff line number Diff line change
Expand Up @@ -3586,3 +3586,15 @@

</details>

<details>

<summary>2024-11-21 11:29:10 - Relation-aware based Siamese Denoising Autoencoder for Malware Few-shot Classification</summary>

- *Jinting Zhu, Julian Jang-Jaccard, Ian Welch, Harith AI-Sahaf, Seyit Camtepe, Aeryn Dunmore, Cybersecurity Lab*

- `2411.14029v1` - [abs](http://arxiv.org/abs/2411.14029v1) - [pdf](http://arxiv.org/pdf/2411.14029v1)

> When malware employs an unseen zero-day exploit, traditional security measures such as vulnerability scanners and antivirus software can fail to detect them. This is because these tools rely on known patches and signatures, which do not exist for new zero-day attacks. Furthermore, existing machine learning methods, which are trained on specific and occasionally outdated malware samples, may struggle to adapt to features in new malware. To address this issue, there is a need for a more robust machine learning model that can identify relationships between malware samples without being trained on a particular malware feature set. This is particularly crucial in the field of cybersecurity, where the number of malware samples is limited and obfuscation techniques are widely used. Current approaches using stacked autoencoders aim to remove the noise introduced by obfuscation techniques through reconstruction of the input. However, this approach ignores the semantic relationships between features across different malware samples. To overcome this limitation, we propose a novel Siamese Neural Network (SNN) that uses relation-aware embeddings to calculate more accurate similarity probabilities based on semantic details of different malware samples. In addition, by using entropy images as inputs, our model can extract better structural information and subtle differences in malware signatures, even in the presence of obfuscation techniques. Evaluations on two large malware sample sets using the N-shot and N-way methods show that our proposed model is highly effective in predicting previously unseen malware, even in the presence of obfuscation techniques.

</details>

Loading

0 comments on commit 4e8e309

Please sign in to comment.