5 CONCLUSION AND FUTURE
WORK
In this research, we found that malware classification
by by family using long-short term memory (LSTM)
models is feasible. However, using just a single
LSTM layer alone yields poor results. We found
that by incorporating techniques from natural lan-
guage processing (NLP), specifically, word embed-
ding and bidirectional LSTMs (biLSTM), greatly im-
proves the performance. We also discovered that that
we could get obtain even better performance by in-
cluding a convolutional neural network (CNN) layer
in our model. Our best model was able to classify
samples from 20 different malware families with an
average accuracy in excess of 81%. We conjecture
that the interplay between the long-term memory of
the biLSTM and the local structure found by the CNN
are the key to obtaining this strong performance.
For future work, more can be done into investi-
gating why applying NLP techniques are so effective
in classifying malware. The addition of an embed-
ding layer, greatly improved our model’s overall ac-
curacy. Other techniques can be considered. For ex-
ample, we might apply principle component analy-
sis (PCA) to reduce the dimensionality of the weights
obtained from the embedding layer. Additionally, ex-
periments involving different word embedding algo-
rithms (e.g., GloVe) would be worthwhile. Finally,
further research into the possible benefits of combin-
ing LSTMs and CNNs in this problem domain would
be of great interest.
REFERENCES
Athiwaratkun, B. and Stokes, J. W. (2017). Malware classi-
fication with LSTM and GRU language models and a
character-level cnn. In 2017 IEEE International Con-
ference on Acoustics, Speech and Signal Processing,
ICASSP, pages 2482–2486.
Britz, D. (2015). Recurrent neural networks tutorial,
introduction. https://www.kdnuggets.com/2015/10/
recurrent-neural-networks-tutorial.html.
Chandak, A., Lee, W., and Stamp, M. (2021). A compari-
son of word2vec, hmm2vec, and pca2vec for malware
classification. In Stamp, M., Alazab, M., and Sha-
laginov, A., editors, Malware Analysis using Artificial
Intelligence and Deep Learning. Springer.
Cheng, J., Dong, L., and Lapata, M. (2016). Long short-
term memory-networks for machine reading. https:
//arxiv.org/abs/1601.06733.
Choudhary, S. and Sharma, A. (2020). Malware detection
& classification using machine learning. In 2020 In-
ternational Conference on Emerging Trends in Com-
munication, Control and Computing, ICONC3, pages
1–4.
Chowdhury, N. and kashem, M. A. (2008). A compara-
tive analysis of feed-forward neural network recurrent
neural network to detect intrusion. In 2008 Interna-
tional Conference on Electrical and Computer Engi-
neering, pages 488–492.
Cui, Z., Ke, R., Pu, Z., and Wang, Y. (2018). Deep
bidirectional and unidirectional LSTM recurrent neu-
ral network for network-wide traffic speed prediction.
https://arxiv.org/abs/1801.02143.
Jain, M., Andreopoulos, W., and Stamp, M. (2020). Con-
volutional neural networks and extreme learning ma-
chines for malware classification. Journal of Com-
puter Virology and Hacking Techniques, 16(3):229–
244.
Lu, R. (2019). Malware detection with LSTM using opcode
language. https://arxiv.org/abs/1906.04593.
Mikolov, T., Chen, K., Corrado, G., and Dean, J. (2013).
Efficient estimation of word representations in vector
space. https://arxiv.org/abs/1301.3781.
Mikolov, T., Kombrink, S., Burget, L.,
ˇ
Cernock
`
y, J., and
Khudanpur, S. (2011). Extensions of recurrent neural
network language model. In 2011 IEEE International
Conference on Acoustics, Speech and Signal Process-
ing, ICASSP, pages 5528–5531.
Mishra, P., Khurana, K., Gupta, S., and Sharma, M. K.
(2019). Vmanalyzer: Malware semantic analysis us-
ing integrated CNN and bi-directional LSTM for de-
tecting VM-level attacks in cloud. In 2019 Twelfth In-
ternational Conference on Contemporary Computing,
IC3, pages 1–6.
Mujumdar, A., Masiwal, G., and Meshram, D. B. (2013).
Analysis of signature-based and behavior-based anti-
malware approaches. International Journal of Ad-
vanced Research in Computer Engineering and Tech-
nology, 2(6).
Nappa, A., Rafique, M. Z., and Caballero, J. (2015).
The MALICIA dataset: Identification and analysis of
drive-by download operations. International Journal
of Information Security, 14(1):15–33.
Prajapati, P. and Stamp, M. (2021). An empirical analysis of
image-based learning techniques for malware classifi-
cation. In Stamp, M., Alazab, M., and Shalaginov, A.,
editors, Malware Analysis using Artificial Intelligence
and Deep Learning. Springer.
Sewak, M., Sahay, S. K., and Rathore, H. (2018). Com-
parison of deep learning and the classical machine
learning algorithm for the malware detection. In 19th
IEEE/ACIS International Conference on Software En-
gineering, Artificial Intelligence, Networking and Par-
allel/Distributed Computing, SNPD, pages 293–296.
Stamp, M. (2017). Introduction to Machine Learning with
Applications in Information Security. Chapman &
Hall/CRC, 1st edition.
Stamp, M. (2019). Alphabet soup of deep learning topics.
https://www.cs.sjsu.edu/
∼
stamp/RUA/alpha.pdf.
Tahir, R. (2018). A study on malware and malware detec-
tion techniques. International Journal of Education
and Management Engineering, 8(2):20–30.
Tavakoli, N. (2019). Modeling genome data using bidirec-
tional LSTM. In 2019 IEEE 43rd Annual Computer
Software and Applications Conference, volume 2 of
COMPSAC, pages 183–188. IEEE.
Malware Classification using Long Short-term Memory Models
751