z-logo
open-access-imgOpen Access
Transforming Malware Behavioural Dataset for Deep Denoising Autoencoders
Author(s) -
Mohd Razif Shamsuddin,
Fakariah Hani Hj Mohd Ali,
Mohd Shahril Bin Zainol Abidin
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/769/1/012071
Subject(s) - malware , computer science , identification (biology) , cryptovirology , artificial intelligence , sandbox (software development) , software , process (computing) , machine learning , deep learning , computer security , data mining , operating system , botany , biology
This research is a part of a major research on automation of malware identification using Deep Denoising Autoencoders. Malicious software, or in short called malware refers to any software designed to cause damage to a single computer, server, or computer network. This malware term includes all kind of malicious software such as computer virus and spyware. All these malicious malware behaviour is monitored, logged and recorded using a cuckoo sandbox with the help of an x86 hosted supervisor software. The intent of recording the malware behaviour is to understand the pattern of behaviour of each known malware family. This collected data will be further trained to a Deep Denoising Autoencoders to automate the identification process of new malware within the identified malware families. However, the raw behaviour data is not suitable for an optimum training process. This paper will discuss the process of transforming the text based behavioural dataset to a more suitable dataset for deep learning purposes. At the end of the research a cleaned bit string format that should represent a unique malware behaviour will be produced.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here