Skip to content

Latest commit

 

History

History
38 lines (23 loc) · 2.06 KB

README.md

File metadata and controls

38 lines (23 loc) · 2.06 KB

Malware Generator Profile

Authors

Victor Simonin
Alexandre Lemonnier
Antoine Zellmeyer
Maxence Plantard


About the project

Our end of studies project involve the implementation of a GAN (Generative Adversarial Network) that generates malware that are not recognized as malware by some malware detection algorithms or systems like Windows Defender.

The aim of this project is to explore the potential of GANs in generating malicious executable that can bypass existing malware detection systems. GANs are a type of deep learning algorithm that can generate new data by learning from existing data. In the context of malware generation, the GAN is trained on a dataset of known malware samples and then used to generate new malware samples that are designed to evade detection.

The project involve several steps, starting with the collection and preparation of a large dataset of known malware samples. This dataset is used to train the GAN to generate new malware samples that can bypass detection by Windows Defender and other malware detection systems.

MalGAN

Implementation of a simple GAN generating Malware from https://github.com/ZaydH/MalwareGAN. Any models can be generated from the original repository. Here a small one has been saved in malGAN/saved_models and is used in the main to get first results.

main.py generates the results with default parameters. bench.ipynb is a benchmark on detectors from a MalGAN model.

Data

Multiple source of data have been discovered and tested.

malgan_samples : Samples from the MalGAN implementation in https://github.com/ZaydH/MalwareGAN

spleipnir Dataset : Dataset from the https://github.com/yanminglai/Malware-GAN implementation.