IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture

dc.contributor.authorVasan, Danish
dc.contributor.authorAlazab, Mamoun
dc.contributor.authorWassan, Sobia
dc.contributor.authorNaeem, Hamad
dc.contributor.authorSafaei, Babak
dc.contributor.authorZheng, Qin
dc.date.accessioned2026-02-06T18:37:31Z
dc.date.issued2020
dc.departmentDoğu Akdeniz Üniversitesi
dc.description.abstractThe volume, type, and sophistication of malware is increasing. Deep convolutional neural networks (CNNs) have lately proven their effectiveness in malware binary detection through image classification. In this paper, we propose a novel classifier to detect variants of malware families and improve malware detection using CNN-based deep learning architecture, called IMCFN (Image-based Malware Classification using Fine-tuned Convolutional Neural Network Architecture). Differing from existing solutions, we propose a new method for multiclass classification problems. Our proposed method converts the raw malware binaries into color images that are used by the fine-tuned CNN architecture to detect and identify malware families. Our method previously trained with the ImageNet dataset (>= 10 million) and utilized the data augmentation to handle the imbalance dataset during the fine-tuning process. For evaluations, an extensive experiment was conducted using 2 datasets: Malimg malware dataset (9,435 samples), and IoT- android mobile dataset (14,733 malware and 2,486 benign samples). Empirical evidence has shown that the IMCFN stands out among the deep learning models including other CNN models with an accuracy of 98.82% in Malimg malware dataset and more than 97.35% for IoT-android mobile dataset. Furthermore, it demonstrates that colored malware dataset performed better in terms of accuracy than grayscale malware images. We compared the performance of IMCFN with the three architectures VGG16, ResNet50 and Google's InceptionV3. We found that our method can effectively detect hidden code, obfuscated malware and malware family variants with little run-time. Our method is resilient to straight forward obfuscation technique commonly used by hackers to disguise malware such as encryption and packing.
dc.identifier.doi10.1016/j.comnet.2020.107138
dc.identifier.issn1389-1286
dc.identifier.issn1872-7069
dc.identifier.orcid0000-0002-1928-3704
dc.identifier.orcid0000-0002-7693-1042
dc.identifier.orcid0000-0002-1675-4902
dc.identifier.orcid0000-0003-1511-218X
dc.identifier.orcid0000-0001-5504-7496
dc.identifier.scopus2-s2.0-85079868859
dc.identifier.scopusqualityQ1
dc.identifier.urihttps://doi.org/10.1016/j.comnet.2020.107138
dc.identifier.urihttps://hdl.handle.net/11129/12497
dc.identifier.volume171
dc.identifier.wosWOS:000528199300004
dc.identifier.wosqualityQ1
dc.indekslendigikaynakWeb of Science
dc.indekslendigikaynakScopus
dc.language.isoen
dc.publisherElsevier
dc.relation.ispartofComputer Networks
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.snmzKA_WoS_20260204
dc.subjectCybersecurity
dc.subjectMalware
dc.subjectImage-based malware detection
dc.subjectConvolutional neural network
dc.subjectTransfer learned
dc.subjectFine-tuned
dc.subjectDeep Learning
dc.subjectObfuscation
dc.subjectIoT-Android Mobile
dc.titleIMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture
dc.typeArticle

Files