Malware Detection for Forensic Memory Using Deep Recurrent Neural Networks
Author(s) -
Ioannis Karamitsos,
Aishwarya Afzulpurkar,
Theodore B. Trafali̇s
Publication year - 2020
Publication title -
journal of information security
Language(s) - English
Resource type - Journals
eISSN - 2153-1242
pISSN - 2153-1234
DOI - 10.4236/jis.2020.112007
Subject(s) - computer science , block (permutation group theory) , executable , pooling , string (physics) , layer (electronics) , malware , metadata , artificial intelligence , probabilistic logic , digital forensics , pattern recognition (psychology) , data mining , machine learning , operating system , geometry , mathematics , organic chemistry , quantum mechanics , chemistry , physics
Memory forensics is a young but fast-growing area of research and a promising one for the field of computer forensics. The learned model is proposed to reside in an isolated core with strict communication restrictions to achieve incorruptibility as well as efficiency, therefore providing a probabilistic memory-level view of the system that is consistent with the user-level view. The lower level memory blocks are constructed using primary block sequences of varying sizes that are fed as input into Long-Short Term Memory (LSTM) models. Four configurations of the LSTM model are explored by adding bi- directionality as well as attention. Assembly level data from 50 Windows portable executable (PE) files are extracted, and basic blocks are constructed using the IDA Disassembler toolkit. The results show that longer primary block sequences result in richer LSTM hidden layer representations. The hidden states are fed as features into Max pooling layers or Attention layers, depending on the configuration being tested, and the final classification is performed using Logistic Regression with a single hidden layer. The bidirectional LSTM with Attention proved to be the best model, used on basic block sequences of size 29. The differences between the model’s ROC curves indicate a strong reliance on the lower level, instructional features, as opposed to metadata or string features.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom