{"id":126041,"date":"2021-08-12T17:50:48","date_gmt":"2021-08-13T00:50:48","guid":{"rendered":"\/blogs\/?p=126041"},"modified":"2025-06-06T01:36:46","modified_gmt":"2025-06-06T08:36:46","slug":"the-rise-of-deep-learning-for-detection-and-classification-of-malware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/","title":{"rendered":"The Rise of Deep Learning for Detection and Classification of Malware"},"content":{"rendered":"<p><span data-contrast=\"auto\">C<\/span><span data-contrast=\"auto\">o-written by\u00a0Catherine Huang, Ph.D.\u00a0and\u00a0Abhishek\u00a0Karnik<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Artificial Intelligence (AI)\u00a0continues to evolve\u00a0and\u00a0has made huge\u00a0progress\u00a0over the last\u00a0decade.\u00a0AI\u00a0shapes our daily lives. Deep learning is\u00a0a\u00a0subset\u00a0of\u00a0techniques\u00a0in\u00a0AI that extract patterns from data using neural networks. Deep learning has been applied to image segmentation, protein structure, machine translation, speech recognition and robotics. It has outperformed human champions in\u00a0the game of\u00a0<\/span><i><span data-contrast=\"auto\">Go<\/span><\/i><span data-contrast=\"auto\">. In recent years, deep learning has been applied to malware analysis. Different types of deep learning algorithms, such as convolutional neural networks (CNN), recurrent neural networks\u00a0and\u00a0Feed-Forward networks, have been applied to\u00a0a\u00a0variety of use cases in malware analysis using bytes sequence, gray-scale image, structural entropy, API call sequence, HTTP traffic and network behavior.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Most traditional machine learning malware classification and detection approaches rely on handcrafted features.\u00a0These features are selected based on experts\u00a0with domain knowledge.\u00a0Feature engineering\u00a0can be a\u00a0very time-consuming process,\u00a0and handcrafted features may not generalize well to novel malware.\u00a0In this blog, we\u00a0briefly\u00a0describe how we apply CNN on raw bytes for malware detection and classification\u00a0in real-world data.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">\n<h2><strong>CNN on Raw Bytes\u00a0<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">The motivation for applying deep learning is to identify new patterns in raw bytes. The novelty of this work is threefold. First, there is no domain-specific feature extraction and pre-processing. Second, it is an end-to-end deep learning approach. It can also perform end-to-end classification. And it can be a feature extractor for feature augmentation. Third, the explainable AI (XAI) provides insights on the CNN decisions and help human identify interesting patterns across malware families. As shown in Figure 1, the input is only raw bytes and labels. CNN performs representation learning to automatically learn features and classify malware. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 style=\"padding-left: 40px;\"><strong>2. Experimental Results\u00a0<\/strong><\/h2>\n<p><span data-contrast=\"auto\">For the purposes of our experiments with malware detection, we first gathered 833,000\u00a0distinct binary samples (Dirty and Clean)\u00a0across multiple families, compilers\u00a0and varying \u201cfirst-seen\u201d time periods.\u00a0There were\u00a0large groups of samples from common families although they did utilize varying packers, obfuscators.\u00a0Sanity checks were performed to discard samples that were corrupt, too large or too small, based on our experiment.\u00a0From\u00a0samples\u00a0that\u00a0met our sanity check criteria, we extracted raw bytes from these samples and utilized them for\u00a0conducting\u00a0multiple\u00a0experiments.\u00a0The data\u00a0was\u00a0randomly\u00a0divided\u00a0into\u00a0a\u00a0training and\u00a0a\u00a0test set\u00a0with\u00a0an\u00a080%\u00a0\/\u00a020% split.\u00a0We utilized this data set to run\u00a0the three\u00a0experiments.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In our first experiment,\u00a0raw bytes from\u00a0the\u00a0833,000\u00a0samples\u00a0were fed to\u00a0the\u00a0CNN\u00a0and\u00a0the\u00a0performance accuracy\u00a0in terms of\u00a0area under\u00a0receiver\u00a0operating\u00a0curve (ROC)\u00a0was 0.9953.\u00a0<\/span><span data-ccp-props=\"{&quot;335559731&quot;:720}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">One observation with the initial run was that, after raw byte extraction from the 833,000 unique samples, we did find duplicate raw byte entries. This was primarily due to malware families that utilized hash-busting as an approach to polymorphism. Therefore, in our second experiment, we deduplicated the extracted raw byte entries. This reduced the raw byte input vector count to 262,000 samples. The test area under ROC was 0.9920.<\/span><span data-ccp-props=\"{&quot;335559731&quot;:720}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In our third experiment, we attempted multi-family malware classification. We took a subset of 130,000 samples from the original set and labeled 11 categories \u2013 the 0<\/span><span data-contrast=\"auto\">th<\/span><span data-contrast=\"auto\">\u00a0were bucketed as Clean, 1-9\u00a0of which were malware families,<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">and\u00a0the\u00a010<\/span><span data-contrast=\"auto\">th<\/span><span data-contrast=\"auto\"> were bucketed as Others.\u00a0Again, these\u00a011 buckets contain samples\u00a0with varying packers and compilers.\u00a0We\u00a0performed\u00a0another\u00a080\u00a0\/\u00a020% random split for the training set and test set.\u00a0For this\u00a0experiment, we\u00a0achieved\u00a0a\u00a0test accuracy\u00a0of\u00a00.9700. The training and test time on one GPU\u00a0was 26 minutes.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 style=\"padding-left: 40px;\"><strong>3. Visual Explanation\u00a0<\/strong><\/h2>\n<p><span data-contrast=\"auto\">To understand the CNN training process, we performed a visual analysis for the CNN training. Figure 2 shows the t-Distributed Stochastic Neighbor Embedding (t-SNE) and Principal Component Analysis (PCA) for before and after CNN training. We can see that after training, CNN is able to extract useful representations to capture characteristics of different types of malware as shown in different clusters. There was a good separation for most categories, lending us to believe that the algorithm was useful as a multi-class classifier.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We then performed XAI to understand CNN\u2019s decisions. Figure 3 shows XAI heatmaps for one sample of Fareit and one sample of Emotet. The brighter the color is the more important the bytes contributing to the gradient activation in neural networks. Thus, those bytes are important to CNN\u2019s decisions. We were interested in understanding the bytes that weighed in heavily on the decision-making and reviewed some samples manually.<\/span><span data-ccp-props=\"{&quot;335559731&quot;:720}\">\u00a0<\/span><\/p>\n<h2 style=\"padding-left: 40px;\"><strong><span class=\"TextRun Underlined SCXW196196725 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW196196725 BCX0\">4. Human analysis<\/span><span class=\"NormalTextRun SCXW196196725 BCX0\">\u00a0to understand the ML decision and XAI\u00a0<\/span><\/span><span class=\"EOP SCXW196196725 BCX0\" data-ccp-props=\"{&quot;134233279&quot;:true}\">\u00a0<\/span><\/strong><\/h2>\n<p><span class=\"TextRun SCXW174722149 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW174722149 BCX0\">To verify if the CNN can learn new patterns,\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">we fed a<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">\u00a0few\u00a0<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2 SCXW174722149 BCX0\">never before seen<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">\u00a0samples to the CNN<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">,<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">\u00a0and requested a\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">human expert to\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">verify the\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">CNN\u2019s decision<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">on<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">some<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">\u00a0random\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">samples<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">. The human\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">analysis\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">verified<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">that\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">the\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">CNN\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">was able to\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">correctly\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">identify\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">many\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">malware families<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">.\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">In some cases, it identified samples accurately before the to<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">p 15\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">AV\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">vendors based on our internal tests<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">. Figure 4 shows a subset of samples that belong to the\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2 SCXW174722149 BCX0\">Nabucur<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">\u00a0family that\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">were correctly ca<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">tegorized by the CNN despite having no\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">vendor detection<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">\u00a0at that point in time<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">.\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">It<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">\u2019s<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">also\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">interesting to note that o<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">ur results\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">showed that the CNN was able to\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">currently\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">categorize\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">malware\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">samples\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">across families utilizing common packers<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">\u00a0into an accurate family\u00a0<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">bucket<\/span><span class=\"NormalTextRun SCXW174722149 BCX0\">.<\/span><\/span><span class=\"EOP SCXW174722149 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We ran domain analysis on\u00a0the same\u00a0sample complier VB files. As shown in Figure 5, CNN\u00a0was able to\u00a0identify\u00a0two samples\u00a0of a\u00a0threat family before other vendors. CNN agreed with MSMP\/other vendors on two samples.\u00a0In this experiment, the\u00a0CNN\u00a0incorrectly\u00a0identified one sample as Clean.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We asked a human expert to inspect an XAI heatmap and verify if those bytes in bright color are associated with the malware family classification. Figure 6 shows one sample which belongs to the Sodinokibi family. The bytes identified by the XAI (c3 8b 4d 08 03 d1 66 c1) are interesting because the byte sequence belongs to part of the Tea decryption algorithm. This indicates these bytes are associated with the malware classification, which confirms the CNN can learn and help identify useful patterns which humans or other automation may have overlooked. Although these experiments were rudimentary, they were indicative of the effectiveness of the CNN in identifying unknown patterns of interest. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In summary, the experimental results and visual explanations demonstrate that CNN can automatically learn PE raw byte representations. CNN raw byte model can perform end-to-end malware classification. CNN can be a feature extractor for feature augmentation. The CNN raw byte model has the potential to identify threat families before other vendors and identify novel threats. These initial results indicate that CNN\u2019s can be a very useful tool to assist automation and human researcher in analysis and classification. Although we still need to conduct a broader range of experiments, it is encouraging to know that our findings can already be applied for early threat triage, identification, and categorization which can be very useful for threat prioritization. <\/span><span data-ccp-props=\"{&quot;335559731&quot;:720}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We believe that McAfee\u2019s ongoing AI research, such as deep learning-based approaches, leads the security industry to tackle the evolving threat landscape, and we look forward to continuing to share our findings in this space with the security community.<\/span><span data-ccp-props=\"{&quot;335559731&quot;:720}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Co-written by\u00a0Catherine Huang, Ph.D.\u00a0and\u00a0Abhishek\u00a0Karnik\u00a0 Artificial Intelligence (AI)\u00a0continues to evolve\u00a0and\u00a0has made huge\u00a0progress\u00a0over the last\u00a0decade.\u00a0AI\u00a0shapes our daily lives. Deep learning is\u00a0a\u00a0subset\u00a0of\u00a0techniques\u00a0in\u00a0AI that&#8230;<\/p>\n","protected":false},"author":695,"featured_media":126083,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-126041","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Rise of Deep Learning for Detection and Classification of Malware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Co-written by\u00a0Catherine Huang, Ph.D.\u00a0and\u00a0Abhishek\u00a0Karnik\u00a0 Artificial Intelligence (AI)\u00a0continues to evolve\u00a0and\u00a0has made huge\u00a0progress\u00a0over the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Rise of Deep Learning for Detection and Classification of Malware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Co-written by\u00a0Catherine Huang, Ph.D.\u00a0and\u00a0Abhishek\u00a0Karnik\u00a0 Artificial Intelligence (AI)\u00a0continues to evolve\u00a0and\u00a0has made huge\u00a0progress\u00a0over the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-13T00:50:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T08:36:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_RiseofDeepLearning.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"The Rise of Deep Learning for Detection and Classification of Malware\",\"datePublished\":\"2021-08-13T00:50:48+00:00\",\"dateModified\":\"2025-06-06T08:36:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/\"},\"wordCount\":1194,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_RiseofDeepLearning.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/\",\"name\":\"The Rise of Deep Learning for Detection and Classification of Malware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_RiseofDeepLearning.jpg\",\"datePublished\":\"2021-08-13T00:50:48+00:00\",\"dateModified\":\"2025-06-06T08:36:46+00:00\",\"description\":\"Co-written by\u00a0Catherine Huang, Ph.D.\u00a0and\u00a0Abhishek\u00a0Karnik\u00a0 Artificial Intelligence (AI)\u00a0continues to evolve\u00a0and\u00a0has made huge\u00a0progress\u00a0over the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_RiseofDeepLearning.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_RiseofDeepLearning.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Rise of Deep Learning for Detection and Classification of Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Rise of Deep Learning for Detection and Classification of Malware | McAfee Blog","description":"Co-written by\u00a0Catherine Huang, Ph.D.\u00a0and\u00a0Abhishek\u00a0Karnik\u00a0 Artificial Intelligence (AI)\u00a0continues to evolve\u00a0and\u00a0has made huge\u00a0progress\u00a0over the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Rise of Deep Learning for Detection and Classification of Malware | McAfee Blog","og_description":"Co-written by\u00a0Catherine Huang, Ph.D.\u00a0and\u00a0Abhishek\u00a0Karnik\u00a0 Artificial Intelligence (AI)\u00a0continues to evolve\u00a0and\u00a0has made huge\u00a0progress\u00a0over the","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-08-13T00:50:48+00:00","article_modified_time":"2025-06-06T08:36:46+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_RiseofDeepLearning.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"The Rise of Deep Learning for Detection and Classification of Malware","datePublished":"2021-08-13T00:50:48+00:00","dateModified":"2025-06-06T08:36:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/"},"wordCount":1194,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_RiseofDeepLearning.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/","name":"The Rise of Deep Learning for Detection and Classification of Malware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_RiseofDeepLearning.jpg","datePublished":"2021-08-13T00:50:48+00:00","dateModified":"2025-06-06T08:36:46+00:00","description":"Co-written by\u00a0Catherine Huang, Ph.D.\u00a0and\u00a0Abhishek\u00a0Karnik\u00a0 Artificial Intelligence (AI)\u00a0continues to evolve\u00a0and\u00a0has made huge\u00a0progress\u00a0over the","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_RiseofDeepLearning.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/300x200_RiseofDeepLearning.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-rise-of-deep-learning-for-detection-and-classification-of-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"The Rise of Deep Learning for Detection and Classification of Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/126041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=126041"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/126041\/revisions"}],"predecessor-version":[{"id":215175,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/126041\/revisions\/215175"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/126083"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=126041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=126041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=126041"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=126041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}