ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술지 Malware Detection Using Byte Streams of Different File Formats
Cited 1 time in scopus Download 103 time Share share facebook twitter linkedin kakaostory
저자
정영섭, 이상민, 김종현, 우지영, 강아름
발행일
202205
출처
IEEE Access, v.10, pp.51041-51047
ISSN
2169-3536
출판사
IEEE
DOI
https://dx.doi.org/10.1109/ACCESS.2022.3171775
협약과제
22HR2700, 지능화된 악성코드 위협으로부터 ICT 인프라 보호, 김종현
초록
Malware detection is becoming more important task as we face more data on the Internet. Web users are vulnerable to non-executable files such as Word files and Hangul Word Processor files because they usually open such files without paying attention. As new infected non-executables keep appearing, deep-learning models are drawing attention because they are known to be effective and have better generalization power. Especially, the deep-learning models have been used to learn arbitrary patterns from byte streams, and they exhibited successful performance on malware detection task. Although there have been malware detection studies using the deep-learning models, they commonly aimed at a single file format and did not take using different formats into consideration. In this paper, we assume that different file formats may contribute to each other, and deep-learning models will have a better chance to learn more promising patterns for better performance. We demonstrate that this assumption is possible by experimental results with our annotated datasets of two different file formats (e.g., Portable Document Format (PDF) and Hangul Word Processor (HWP)).
KSP 제안 키워드
Detection task, File format, Learning model, Malware detection, Portable Document Format(PDF), Word Processor, deep learning(DL)
본 저작물은 크리에이티브 커먼즈 저작자 표시 (CC BY) 조건에 따라 이용할 수 있습니다.
저작자 표시 (CC BY)