Open Access
Open access
volume 10 pages 58488-58502

Static Malware Detection Using Stacked BiLSTM and GPT-2

Publication typeJournal Article
Publication date2022-05-30
scimago Q1
wos Q2
SJR0.849
CiteScore9.0
Impact factor3.6
ISSN21693536
General Materials Science
Electrical and Electronic Engineering
General Engineering
General Computer Science
Abstract
In recent years, cyber threats and malicious software attacks have been escalated on various platforms. Therefore, it has become essential to develop automated machine learning methods for defending against malware. In the present study, we propose stacked bidirectional long short-term memory (Stacked BiLSTM) and generative pre-trained transformer based (GPT-2) deep learning language models for detecting malicious code. We developed language models using assembly instructions extracted from .text sections of malicious and benign Portable Executable (PE) files. We treated each instruction as a sentence and each .text section as a document. We also labeled each sentence and document as benign or malicious, according to the file source. We created three datasets from those sentences and documents. The first dataset, composed of documents, was fed into a Document Level Analysis Model (DLAM) based on Stacked BiLSTM. The second dataset, composed of sentences, was used in Sentence Level Analysis Models (SLAMs) based on Stacked BiLSTM and DistilBERT, Domain Specific Language Model GPT-2 (DSLM-GPT2), and General Language Model GPT-2 (GLM-GPT2). Lastly, we merged all assembly instructions without labels for creating the third dataset; then we fed a custom pre-trained model with it. We then compared malware detection performances. The results showed that the pre-trained model improved the DSLM-GPT2 and GLM-GPT2 detection performance. The experiments showed that the DLAM, the SLAM based on DistilBERT, the DSLM-GPT2, and the GLM-GPT2 achieved 98.3%, 70.4%, 86.0%, and 76.2% F1 scores, respectively.
Found 
Found 

Top-30

Journals

1
2
3
4
5
6
7
IEEE Access
7 publications, 14.58%
Computers and Security
3 publications, 6.25%
Journal of Systems and Software
3 publications, 6.25%
Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
2 publications, 4.17%
Sensors
2 publications, 4.17%
IEEE Transactions on Dependable and Secure Computing
2 publications, 4.17%
Computers, Materials and Continua
1 publication, 2.08%
International Journal of Mechanical Engineering Education
1 publication, 2.08%
Artificial Intelligence in Data and Big Data Processing
1 publication, 2.08%
ACM Computing Surveys
1 publication, 2.08%
Neurocomputing
1 publication, 2.08%
Future Internet
1 publication, 2.08%
Communications in Computer and Information Science
1 publication, 2.08%
Electronics (Switzerland)
1 publication, 2.08%
IET Cyber-Physical Systems: Theory and Applications
1 publication, 2.08%
International Journal of Information Management Data Insights
1 publication, 2.08%
Computation
1 publication, 2.08%
Scientific Reports
1 publication, 2.08%
Applied Sciences (Switzerland)
1 publication, 2.08%
Geo Journal
1 publication, 2.08%
Journal of Computer Virology and Hacking Techniques
1 publication, 2.08%
Journal of Computer Security
1 publication, 2.08%
PLoS ONE
1 publication, 2.08%
AIP Conference Proceedings
1 publication, 2.08%
Procedia Computer Science
1 publication, 2.08%
1
2
3
4
5
6
7

Publishers

2
4
6
8
10
12
14
16
18
20
Institute of Electrical and Electronics Engineers (IEEE)
19 publications, 39.58%
Elsevier
9 publications, 18.75%
MDPI
6 publications, 12.5%
Springer Nature
5 publications, 10.42%
SAGE
2 publications, 4.17%
IGI Global
2 publications, 4.17%
Tech Science Press
1 publication, 2.08%
Association for Computing Machinery (ACM)
1 publication, 2.08%
Institution of Engineering and Technology (IET)
1 publication, 2.08%
Public Library of Science (PLoS)
1 publication, 2.08%
AIP Publishing
1 publication, 2.08%
2
4
6
8
10
12
14
16
18
20
  • We do not take into account publications without a DOI.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
48
Share
Cite this
GOST |
Cite this
GOST Copy
Demirci D. et al. Static Malware Detection Using Stacked BiLSTM and GPT-2 // IEEE Access. 2022. Vol. 10. pp. 58488-58502.
GOST all authors (up to 50) Copy
Demirci D., Sahin N., Sirlancis M., Acartürk C. Static Malware Detection Using Stacked BiLSTM and GPT-2 // IEEE Access. 2022. Vol. 10. pp. 58488-58502.
RIS |
Cite this
RIS Copy
TY - JOUR
DO - 10.1109/access.2022.3179384
UR - https://doi.org/10.1109/access.2022.3179384
TI - Static Malware Detection Using Stacked BiLSTM and GPT-2
T2 - IEEE Access
AU - Demirci, Deniz
AU - Sahin, Nazenin
AU - Sirlancis, Melih
AU - Acartürk, Cengiz
PY - 2022
DA - 2022/05/30
PB - Institute of Electrical and Electronics Engineers (IEEE)
SP - 58488-58502
VL - 10
SN - 2169-3536
ER -
BibTex
Cite this
BibTex (up to 50 authors) Copy
@article{2022_Demirci,
author = {Deniz Demirci and Nazenin Sahin and Melih Sirlancis and Cengiz Acartürk},
title = {Static Malware Detection Using Stacked BiLSTM and GPT-2},
journal = {IEEE Access},
year = {2022},
volume = {10},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
month = {may},
url = {https://doi.org/10.1109/access.2022.3179384},
pages = {58488--58502},
doi = {10.1109/access.2022.3179384}
}