Abstract
This paper deals with improvement of malware protection efficiency. The analysis of applied scientific researches devoted to creation of malware protection systems suggests that the improvement of mathematical tools using modern neural network models based on deep neural networks is a promising trend in the development of malware detection systems. Also, the results of analysis have determined the need to create a development method for the deep neural network architecture suitable for use within the modern malware detection means. As part of the study, a method for developing a deep neural network architecture designed to detect malicious software has been suggested. In contrast to the existing methods, it helps avoid long-term numerical experiments to determine the expediency of application of the neural network model and optimize its structural parameters during the development. At the same time, multiple experiments conducted using Microsoft BIG-2015 malware database have shown that the method constructs a neural network model that provides a detection error commensurate with the error of modern malware detection systems. Prospective research is related to the adaptation of the suggested method for the application of deep neural networks in behaviour analysers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ahmadi, M., Ulyanov, D., Semenov, S., Trofimov, M., Giacinto, G.: Novel feature extraction, selection and fusion for effective malware family classification. In: Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy (CODASPY 2016), New York, NY, USA, pp. 183–194 (2016)
Akhmetov, B.A., Lakhno, V.B., Akhmetov, B.C., Alimseitova, Z.: Development of sectoral intellectualized expert systems and decision making support systems in cybersecurity. In: Advances in Intelligent Systems and Computing, 2nd Computational Methods in Systems and Software (CoMeSySo), vol. 860, pp. 162–171 (2018). https://doi.org/10.1007/978-3-030-00184-1_15
Artemenko, A.V., Golovko, V.A.: Analysis of neural network computer virus recognition methods. Molodezhnyiy innovatsionnyiy forum «INTRI», GU «BelISA», Minsk, Belorus, 239 p. (2010). (in Russian)
Asiru, O.F., Dlamini, M.T., Asiru, J.M.B.: Application of artificial intelligence for detecting derived viruses. In: 16th European Conference on Cyber Warfare and Security (ECCWS 2017), University College Dublin, Dublin, Ireland, 29–30 June 2017, pp. 217–227 (2017)
Bapiyev, I.M., Aitchanov, B.H., Tereikovskyi, I.A., Tereikovska, L.A., Korchenko, A.A.: Deep neural networks in cyber attack detection systems. Int. J. Civil Eng. Technol. (IJCIET) 8(11), 1086–1092 (2017)
Dychka, I., Tereikovskyi, I., Tereikovska, L., Pogorelov, V., Mussiraliyeva, S.: Deobfuscation of computer virus malware code with value state dependence graph. In: Advances in Intelligent Systems and Computing, pp. 370–379 (2018). https://doi.org/10.1007/978-3-319-91008-6
Falaye, A.A., Oluyemi, E.S., Victor, A.N., Uchenna, U.C., Ogedengbe, O., Ale, S.: Parametric equation for capturing dynamics of cyber attack malware transmission with mitigation on computer network. Int. J. Math. Sci. Comput. (IJMSC) 3(4), 37–51 (2017). https://doi.org/10.5815/ijmsc.2017.04.04
Hu, Z., Tereykovskiy, I.A., Tereykovska, L.O., Pogorelov, V.V.: Determination of structural parameters of multilayer perceptron designed to estimate parameters of technical systems. Int. J. Intell. Syst. Appl. (IJISA) 9(10), 57–62 (2017). https://doi.org/10.5815/ijisa.2017.10.07
Korchenko, A., Tereykovskiy, I., Karpinskiy, N., Tynymbayev, S.: Neural network models, methods and tools for assessing the security parameters of internet-oriented information systems. In: TOV NashFormat, Kiev, Ukraine, 275 p. (2016). (in Russian)
Lakhno, V., Malyukov, V., Parkhuts, L., Buriachok, V., Satzhanov, B., Tabylov, A.: Funding model for port information system cyber security facilities with incomplete Hacker. J. Theor. Appl. Inf. Technol. 96(13), 4215–4225 (2018)
Rudenko, O.H., Bodianskyi, Ye.: Artificial neural networks, Kharkiv, Kompaniia SMIT, 404 p. (2016). (in Ukranian)
Shah, S., Jani, H., Shetty, S., Bhowmick, K.: Virus detection using artificial neural networks. Int. J. Comput. Appl. 84(5), 17–23 (2013)
Sharma, S.: Design and implementation of malware detection scheme. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 10(8), 58–66 (2018). https://doi.org/10.5815/ijcnis.2018.08.07
Sujyothi, A., Acharya, S.: Dynamic malware analysis and detection in virtual environment. Int. J. Modern Educ. Comput. Sci. (IJMECS) 9(3), 48–55 (2017). https://doi.org/10.5815/ijmecs.2017.03.06
Tahir, R.: A study on malware and malware detection techniques. Int. J. Educ. Manag. Eng. (IJEME) 8(2), 20–30 (2018). https://doi.org/10.5815/ijeme.2018.02.03
Tereykovska, L., Tereykovskiy, I., Aytkhozhaeva, E., Tynymbayev, S., Imanbayev, A.: Encoding of neural network model exit signal, that is devoted for distinction of graphical images in biometric authenticate systems. News Natl. Acad. Sci. Repub. Kaz. Ser. Geol. Tech. Sci. 6(426), 217–224 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Dychka, I., Chernyshev, D., Tereikovskyi, I., Tereikovska, L., Pogorelov, V. (2020). Malware Detection Using Artificial Neural Networks. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education II. ICCSEEA 2019. Advances in Intelligent Systems and Computing, vol 938. Springer, Cham. https://doi.org/10.1007/978-3-030-16621-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-16621-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-16620-5
Online ISBN: 978-3-030-16621-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)