
0.9978 and 0.9978 respectively. The effectiveness of
the proposed hybrid augmentation method is evident
in the Precision, Recall and F1 scores provided in Ta-
ble 4 for Vision Transformer based classifiers.
The training snapshots for the ViT-B/32 model,
trained with and without hybrid augmentation are
presented in Figure 6. The classifier exhibits fewer
misclassifications when trained with the hybrid aug-
mented dataset, underscoring the efficacy of proposed
hybrid augmentation technique.
5 CONCLUSION AND FUTURE
WORK
In this study, we developed a set of malware classi-
fiers based on Transfer, Transformer and CNN mod-
els to identify different malware classes. We incorpo-
rated DC-GAN augmentation and classical augmenta-
tion methods alongside these classifiers. Furthermore,
we introduced a hybrid augmentation technique that
combines DCGAN and classical augmentation meth-
ods.
Initially, a dataset containing six-class malware
samples was created, and the developed classifiers
were trained to learn patterns from this dataset. The
performance of these classifiers was evaluated using
metrics such as accuracy, loss, precision, recall and F1
score. The initial dataset was then augmented using
DCGAN, traditional and the proposed method. Ex-
perimental results indicated that the ViT-B/32 model-
based classifier, trained with a dataset augmented with
the proposed method, outperformed others, achieving
the highest accuracy of 99.94%.
In the second phase of experiments, we utilized
the publicly available Malimg dataset with the devel-
oped classifiers and the proposed augmentation tech-
nique. Here as well, classifiers trained with a hybrid
augmentation-enhanced dataset outperformed those
trained with a non-augmented dataset, achieving the
highest accuracy of 99.79%.
Overall, the augmentation process aimed to en-
hance the resilience and generalizability of malware
detection models by amplifying diversity and vari-
ability within the dataset. The experimental out-
comes underscore that incorporating augmented train-
ing data into the dataset contributes to the enhance-
ment of classifier performance. This study utilized
only one dataset and future research could explore dif-
ferent datasets with model diversity for malware de-
tection and classification.
ACKNOWLEDGMENT
This study was funded by the International Exchange
Program of the National Institute of Information and
Communications Technology (NICT), Japan.
REFERENCES
Abdelsalam, M., Krishnan, R., Huang, Y., and Sandhu,
R. (2018). Malware detection in cloud infrastruc-
tures using convolutional neural networks. In 2018
IEEE 11th international conference on cloud comput-
ing (CLOUD), pages 162–169. IEEE.
Belal, M. M. and Sundaram, D. M. (2023). Global-
local attention-based butterfly vision transformer for
visualization-based malware classification. IEEE Ac-
cess, 11:69337–69355.
Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn,
D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer,
M., Heigold, G., Gelly, S., et al. (2020). An image is
worth 16x16 words: Transformers for image recogni-
tion at scale. arXiv preprint arXiv:2010.11929.
Hu, H., Peng, S., He, Z., and Huang, L. (2021). Mal-
gan: Gan-augmented dataset for malware detection.
In Proceedings of the 2021 International Conference
on Computer Science and Network Technology, pages
246–252. ACM.
Ma, X., Yang, S., and Yang, H. (2021). Malware classifica-
tion based on vision transformer. Journal of Physics:
Conference Series, 1932(1):012024.
Microsoft (2023). Microsoft security intelligence. Mi-
crosoft.
Nataraj, L., Karthikeyan, S., Jacob, G., and Manjunath,
B. S. (2011). Malware images: visualization and auto-
matic classification. In Proceedings of the 8th interna-
tional symposium on visualization for cyber security,
pages 1–7.
Sharma, A., Malacaria, P., and Khouzani, M. (2019).
Malware detection using 1-dimensional convolutional
neural networks. In 2019 IEEE European symposium
on security and privacy workshops (EuroS&PW),
pages 247–256. IEEE.
Tobiyama, S., Yamaguchi, Y., Shimada, H., Ikuse, T., and
Yagi, T. (2016). Malware detection with deep neural
network using process behavior. In 2016 IEEE 40th
annual computer software and applications confer-
ence (COMPSAC), volume 2, pages 577–582. IEEE.
Verma, V., Muttoo, S. K., and Singh, V. (2020). Multiclass
malware classification via first-and second-order tex-
ture statistics. Computers & Security, 97:101895.
Yeo, M., Koo, Y., Yoon, Y., Hwang, T., Ryu, J., Song,
J., and Park, C. (2018). Flow-based malware de-
tection using convolutional neural network. In 2018
International Conference on Information Networking
(ICOIN), pages 910–913. IEEE.
Zhang, J., Qin, Z., Yin, H., Ou, L., and Hu, Y. (2016). Irmd:
malware variant detection using opcode image recog-
nition. In 2016 IEEE 22nd International Conference
on Parallel and Distributed Systems (ICPADS), pages
1175–1180. IEEE.
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
830