Skip to content

Commit

Permalink
* update 2024-09-19 06:20:20
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Sep 18, 2024
1 parent da18e42 commit fc3ec5e
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 1 deletion.
12 changes: 12 additions & 0 deletions arXiv_db/Malware/2024.md
Original file line number Diff line number Diff line change
Expand Up @@ -2678,3 +2678,15 @@

</details>

<details>

<summary>2024-09-17 15:02:32 - Towards Novel Malicious Packet Recognition: A Few-Shot Learning Approach</summary>

- *Kyle Stein, Andrew A. Mahyari, Guillermo Francia III, Eman El-Sheikh*

- `2409.11254v1` - [abs](http://arxiv.org/abs/2409.11254v1) - [pdf](http://arxiv.org/pdf/2409.11254v1)

> As the complexity and connectivity of networks increase, the need for novel malware detection approaches becomes imperative. Traditional security defenses are becoming less effective against the advanced tactics of today's cyberattacks. Deep Packet Inspection (DPI) has emerged as a key technology in strengthening network security, offering detailed analysis of network traffic that goes beyond simple metadata analysis. DPI examines not only the packet headers but also the payload content within, offering a thorough insight into the data traversing the network. This study proposes a novel approach that leverages a large language model (LLM) and few-shot learning to accurately recognizes novel, unseen malware types with few labels samples. Our proposed approach uses a pretrained LLM on known malware types to extract the embeddings from packets. The embeddings are then used alongside few labeled samples of an unseen malware type. This technique is designed to acclimate the model to different malware representations, further enabling it to generate robust embeddings for each trained and unseen classes. Following the extraction of embeddings from the LLM, few-shot learning is utilized to enhance performance with minimal labeled data. Our evaluation, which utilized two renowned datasets, focused on identifying malware types within network traffic and Internet of Things (IoT) environments. Our approach shows promising results with an average accuracy of 86.35% and F1-Score of 86.40% on different malware types across the two datasets.

</details>

Loading

0 comments on commit fc3ec5e

Please sign in to comment.