Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2019, Article ID 8485365, 9 pages
https://doi.org/10.1155/2019/8485365
Research Article

Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks

SCH Media Labs, Soonchunhyang University, Asan 31538, Republic of Korea

Correspondence should be addressed to Ah Reum Kang; ten.gnakra@kmra

Received 25 January 2019; Accepted 11 March 2019; Published 3 April 2019

Guest Editor: Pelin Angin

Copyright © 2019 Young-Seob Jeong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. Liu, H. Wang, and A. Stavrou, “Detecting malicious JavaScript in pdf through document instrumentation,” in Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 100–111, IEEE, Atlanta, GA, USA, June 2014. View at Scopus
  2. T. T. Um, F. M. J. Pfister, D. Pichler et al., “Data augmentation of wearable sensor data for Parkinson’s disease monitoring using convolutional neural networks,” in Proceedings of the 19th ACM International Conference on Multimodal Interaction, pp. 216–220, ACM, Glasgow, Scotland, 2017.
  3. Z. M. Kim, Y. S. Jeong, H. R. Oh et al., “Investigating the impact of possession-way of a smartphone on action recognition,” Sensors, vol. 16, no. 6, pp. 1–5, 2016. View at Google Scholar
  4. Y. Kim, “Convolutional neural networks for sentence classification,” in Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, pp. 1746–1751, Association for Computational Linguistics, Doha, Qatar, October 2014. View at Scopus
  5. A. Hannun, C. Case, and J. Casper, “Deep speech: scaling up end-to-end speech recognition,” Computing Research Repository, pp. 1–12, 2014. View at Google Scholar
  6. J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, “You only look once: Unified, real-time object detection,” in Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, pp. 779–788, IEEE, Las Vegas Valley, NV, USA, July 2016. View at Scopus
  7. N. Šrndić and P. Laskov, “Hidost: a static machine-learning-based detector of malicious files,” EURASIP Journal on Information Security, vol. 2016, no. 1, p. 22, 2016. View at Google Scholar · View at Scopus
  8. B. Cuan, A. Damien, C. Delaplace et al., Malware Detection in PDF Files Using Machine Learning [PhD. Thesis], REDOCS, 2018. View at Publisher · View at Google Scholar
  9. C. Smutz and A. Stavrou, “Malicious PDF detection using metadata and structural features,” in Proceedings of the 28th Annual Computer Security Applications Conference, pp. 239–248, Orlando, Fla, USA, December 2012. View at Scopus
  10. M. Li, Y. Liu, M. Yu et al., “FEPDF: a robust feature extractor for malicious PDF detection,” in Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 218–224, IEEE, Sydney, Australia, August 2017. View at Scopus
  11. J. C. Platt, “Sequential minimal optimization: a fast algorithm for training support vector machines,” in Advances in Kernel Methods – Support Vector Learning, MIT Press, Cambridge, Mass, USA, 1998. View at Google Scholar
  12. S. J. Khitan, A. Hadi, and J. Atoum, “PDF forensic analysis system using YARA,” International Journal of Computer Science and Network Security, vol. 17, no. 5, pp. 77–85, 2017. View at Google Scholar
  13. J. Zhang, “MLPdf: an effective machine learning based approach for PDF malware detection,” Security and Cryptography, 2018. View at Google Scholar
  14. B. Kolosnjaji, A. Zarras, G. Webster et al., “Deep learning for classification of malware system call sequences,” Lecture Notes in Computer Science, vol. 9992, pp. 137–149, 2016. View at Google Scholar · View at Scopus
  15. S. Hochreiter and J. Schmidhuber, “Long short-term memory,” Neural Computation, vol. 9, no. 8, pp. 1735–1780, 1997. View at Publisher · View at Google Scholar · View at Scopus
  16. W. Huang and J. W. Stokes, “MtNet: a multi-task neural network for dynamic malware classification,” Lecture Notes in Computer Science, vol. 9721, pp. 399–418, 2016. View at Google Scholar · View at Scopus
  17. E. Raff, J. Sylvester, and C. Nicholas, “Learning the PE header, malware detection with minimal domain knowledge,” in Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 121–132, ACM, Dallas, TX, USA, 2017. View at Scopus
  18. J. Saxe and K. Berlin, “Deep neural network based malware detection using two dimensional binary program features,” in Proceedings of the 10th International Conference on Malicious and Unwanted Software, pp. 11–20, IEEE, Fajardo, PR, USA, October 2015. View at Scopus
  19. Q. Le, O. Boydell, B. Mac Namee, and M. Scanlon, “Deep learning at the shallow end: Malware classification for non-domain experts,” Digital Investigation, vol. 26, pp. S118–S126, 2018. View at Publisher · View at Google Scholar
  20. E. Raff, J. B. Barker, J. Sylvester et al., “Malware detection by eating a whole EXE,” in Proceedings of the in Proceedings of the Workshops of the Thirty-Second AAAI Conference on Artificial Intelligence, pp. 268–276, New Orleans, LA, USA, 2018.
  21. Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning applied to document recognition,” Proceedings of the IEEE, vol. 86, no. 11, pp. 2278–2323, 1998. View at Publisher · View at Google Scholar · View at Scopus
  22. A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet classification with deep convolutional neural networks,” in Proceedings of the Advances in Neural Information Processing Systems 25, Lake Tahoe, NV, USA, December 2012. View at Scopus
  23. C. Szegedy, W. Liu, Y. Jia et al., “Going deeper with convolutions,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–9, IEEE, Boston, MA, USA, June 2015. View at Scopus
  24. G. Huang, Z. Liu, L. Maaten et al., “Densely connected convolutional networks,” in Proceedings of the 30th IEEE Conference on Computer Vision and Pattern Recognition, pp. 2261–2269, IEEE, Honolulu, HI, USA, July 2017. View at Scopus
  25. B. E. Boser, I. M. Guyon, and V. N. Vapnik, “Training algorithm for optimal margin classifiers,” in Proceedings of the 5th Annual ACM Workshop on Computational Learning Theory, pp. 144–152, ACM, Pittsburgh, PA, USA, July 1992. View at Scopus
  26. L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, pp. 5–32, 2001. View at Publisher · View at Google Scholar · View at Scopus
  27. D. P. Kingma and J. L. Ba, “Adam: a method for stochastic optimization,” in Proceedings of the in Proceedings of the 3rd International Conference for Learning Representations, San Diego, Calif, USA, 2015.
  28. N. Srivastava, G. Hinton, A. Krizhevsky et al., “Dropout: a simple way to prevent neural networks from overfitting,” Journal of Machine Learning Research, vol. 15, pp. 1929–1958, 2014. View at Google Scholar · View at Scopus
  29. S. Ioffe and C. Szegedy, “Batch normalization: accelerating deep network training by reducing internal covariate shift,” in Proceedings of the 32nd International Conference on Machine Learning, pp. 448–456, ACM, Lille, France, July 2015. View at Scopus
  30. M. Cogswell, F. Ahmed, R. Girshick et al., “Reducing overfitting in deep networks by decorrelating representations,” in Proceedings of the 4th International Conference for Learning Representations, San Juan, PR, USA, 2016.
  31. K. He, X. Zhang, S. Ren et al., “Delving deep into rectifiers: surpassing human-level performance on imagenet classification,” in Proceedings of the 15th IEEE International Conference on Computer Vision, pp. 1026–1034, Santiago, Chile, December 2015. View at Scopus