AIセキュリティポータル K Program
Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls
Share
Abstract
In the current cybersecurity landscape, protecting military devices such as communication and battlefield management systems against sophisticated cyber attacks is crucial. Malware exploits vulnerabilities through stealth methods, often evading traditional detection mechanisms such as software signatures. The application of ML/DL in vulnerability detection has been extensively explored in the literature. However, current ML/DL vulnerability detection methods struggle with understanding the context and intent behind complex attacks. Integrating large language models (LLMs) with system call analysis offers a promising approach to enhance malware detection. This work presents a novel framework leveraging LLMs to classify malware based on system call data. The framework uses transfer learning to adapt pre-trained LLMs for malware detection. By retraining LLMs on a dataset of benign and malicious system calls, the models are refined to detect signs of malware activity. Experiments with a dataset of over 1TB of system calls demonstrate that models with larger context sizes, such as BigBird and Longformer, achieve superior accuracy and F1-Score of approximately 0.86. The results highlight the importance of context size in improving detection rates and underscore the trade-offs between computational complexity and performance. This approach shows significant potential for real-time detection in high-stakes environments, offering a robust solution to evolving cyber threats.
Cyber threats and cyber deception in hybrid warfare
William Steingartner, Darko Galinec
Published: 2021
When autonomous intelligent goodware will fight autonomous intelligent malware: A possible future of cyber defense
Paul Theron, Alxander Kott
Published: 2019
Trusting artificial intelligence in cybersecurity is a double-edged sword
Mariarosaria Taddeo, Tom McCutcheon, Luciano Floridi
Published: 2019
Cybersecurity data science: an overview from machine learning perspective
I. H. Sarker, A. Kayes, S. Badsha, H. Alqahtani, P. Watters, A. Ng
Published: 2020
Malwspecsys: A dataset containing syscalls of an iot spectrum sensor affected by heterogeneous malware
Ramon Solo de Zaldivar, Alberto Huertas Celdran, Jan von der Assen, Pedro Miguel Sanchez Sánchez, Gérôme Bovet, Gregorio Martínez Perez, Burkhard Stiller
Published: 2022
Sequencegram: n-gram modeling of system calls for program based anomaly detection
Neminath Hubballi, Santosh Biswas, Sukumar Nandi
Published: 2011
Malgra: Machine learning and n-gram malware feature extraction and detection system
Muhammad Ali, Stavros Shiaeles, Gueltoum Bendiab, Bogdan Ghita
Published: 2020
Privacy-preserving and syscall-based intrusion detection system for iot spectrum sensors affected by data falsification attacks
Alberto Huertas Celdran, Pedro Miguel Sánchez Sánchez, Chao Feng, Gérôme Bovet, Gregorio Martínez Perez, Burkhard Stiller
Published: 2022
Survey of intrusion detection systems: techniques, datasets, and challenges
Khraisat, A., et al.
Published: 2019
Can language models help in system security? investigating log anomaly detection using bert
Crispin Almodovar, Fariza Sabrina, Sarvnaz Karimi, Salahuddin Azad
Published: 2022
Bert-log: Anomaly detection for system logs based on pre-trained language model
Song Chen, Hai Liao
Published: 2022
Electrosense: Open and big spectrum data
Sreeraj Rajendran, Roberto Calvo-Palomino, Markus Fuchs, Bertold Van den Bergh, Hector Cordobés, Domenico Giustiniano, Sofie Pollin, Vincent Lenders
Published: 2017
Intelligent and behavioral-based detection of malware in iot spectrum sensors
Alberto Huertas Celdran, Pedro Miguel Sánchez Sánchez, Miguel Azorín Castillo, Gérôme Bovet, Gregorio Martínez Perez, Burkhard Stiller
Published: 2023
Share