Computer Science ›› 2026, Vol. 53 ›› Issue (4): 435-444.doi: 10.11896/jsjkx.250500078

• Information Security • Previous Articles     Next Articles

Cross-modal Fusion Few-sample Ransomware Classifier:Multimodal Encoding Based on Pre-trained Models

YIN Chuang, LIU Jianyi, ZHANG Ru   

  1. School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2025-05-19 Revised:2025-09-08 Online:2026-04-15 Published:2026-04-08
  • About author:YIN Chuang,born in 2002,postgra-duate.His main research interests include deep learning and cyber security.
    LIU Jianyi,professor,Ph.D supervisor,is a member of CCF(No.17814M).His main research interests include digital content security and data mining.
  • Supported by:
    National Natural Science Foundation of China(U21B2020).

Abstract: Ransomware,defined by its mechanism of encrypting critical data to extort payment from victims,results in global ransom payments exceeding $1 billion in 2023.Precise classification of ransomware is crucial for effective security defense.How-ever,ransomware samples are often small.To address this challenge,this paper proposes a cross-modal fusion few-shot ransomware classifier named CMFu,comprising a feature construction module,an encoding module,and a fusion module.The feature construction module generates cross-modal features.The encoding module employs two pre-trained models to construct encoders that encode features from different modalities.The fusion module integrates the encoded data to achieve the final classification.Experimental evaluation assesses model performance under training sample ratios of 10%,30%,and 50%.CMFu outperforms all baseline model across all metrics.At a 30% sample ratio,CMFu achieves precision,recall,and F1-score of 0.91,0.91,and 0.90,respectively,demonstrating superior performance.When the sample ratio decreases to 10%,these metrics remain high at 0.78,0.84,and 0.80,confirming its ability in few-shot ransomware classification.Furthermore,ablation studies validate both the viabili-ty of the pre-training-based encoders and the necessity of employing backbone networks for fusion.

Key words: Ransomware, Few samples, Multiple modalities, Pre-trained models, Deep learning

CLC Number: 

  • TP393
[1]YAN S,REN J,WANG W,et al.A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security[J].IEEE Communications Surveys & Tutorials,2023,25(1):467-496.
[2]SHAH N,FARIK M.Ransomware-Threats,Vulnerabilities and Recommendations[J].International Journal of Scientific & Technology Research,2017,6:307-309.
[3]The State of Ransomware 2023[EB/OL].(2023-05-10)[2025-06-24].https://news.sophos.com/en-us/2023/05/10/the-state-of-ransomware-2023/.
[4]XUE D,LI J,LYU T,et al.Malware Classification Using Probability Scoring and Machine Learning[J].IEEE Access,2019,7:91641-91656.
[5]WASOYE S,STEVENS M,MORGAN C,et al.RansomwareClassification Using BTLS Algorithm and Machine Learning Approaches[EB/OL].https://doi.org/10.21203/rs.3.rs-5131919/v1.
[6]ZHU J,JANG-JACCARD J,SINGH A,et al.A few-shot meta-learning based siamese neural network using entropy features for ransomware classification[J].Computers & Security,2022,117:102691.
[7]FINN C,ABBEEL P,LEVINE S.Model-agnostic meta-learning for fast adaptation of deep networks[C]//Proceedings of the 34th International Conference on Machine Learning.2017:1126-1135.
[8]JI Y,ZOU K,ZOU B.Mi-MAML:Classifying few-shot advanced malware using multi-improved model-agnostic meta-learning[J].Cybersecurity,2024,7(1):72.
[9]ZHAO W X,ZHOU K,LI J,et al.A Survey of Large Language Models[J].arXiv:2303.18223,2023.
[10]WU J,GAN W,CHEN Z,et al.Multimodal Large Language Models:A Survey[C]//2023 IEEE International Conference on Big Data(BigData).IEEE,2023:15-18.
[11]ZHONG X,BAN H.Pre-trained network-based transfer lear-ning:A small-sample machine learning approach to nuclear power plant classification problem[J].Annals of Nuclear Energy,2022,175:109201.
[12]CHEN X,LIU T,FOURNIER-VIGER P,et al.A fine-grained self-adapting prompt learning approach for few-shot learning with pre-trained language models[J].Knowledge-Based Systems,2024,299:111968.
[13]LIN Z,YU S,KUANG Z,et al.Multimodality helps unimodality:Cross-modal few-shot learning with multimodal models[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.IEEE,2023.
[14]CHRISTODORESCU M,JHA S.Static analysis of executables to detect malicious patterns[C]//Proceedings of the 12th Conference on USENIX Security Symposium.Washington,DC:USENIX Association,2003.
[15]ABUSITTA A,LI M Q,FUNG B C M.Malware classification and composition analysis:A survey of recent developments[J].Journal of Information Security and Applications,2021,59:102828.
[16]FIRDAUSI I,LIM C,ERWIN A,et al.Analysis of MachineLearning Techniques Used in Behavior-Based Malware Detection[C]//2010 Second International Conference on Advances in Computing,Control,and Telecommunication Technologies.IEEE,2010:2-3.
[17]KOLOSNJAJI B,ZARRAS A,WEBSTER G,et al.Deep Lear-ning for Classification of Malware System Call Sequences[C]//Australasian Joint Conference on Artificial Intelligence.Sprin-ger,2016.
[18]SHARMA O,SHARMA A,KALIA A.MIGAN:GAN for faci-litating malware image synthesis with improved malware classification on novel dataset[J].Expert Systems with Applications,2024,241:122678.
[19]DENG H,GUO C,SHEN G,et al.MCTVD:A malware classification method based on three-channel visualization and deep learning[J].Computers & Security,2023,126:103084.
[20]ABBASI M S,AL-SAHAF H,MANSOORI M,et al.Behavior-based ransomware classification:A particle swarm optimization wrapper-based approach for feature selection[J].Applied Soft Computing,2022,121:108744.
[21]AURANGZEB S,ANWAR H,NAEEM M A,et al.BigRC-EML:Big-data based ransomware classification using ensemble machine learning[J].Cluster Computing,2022,25(5):3405-3422.
[22]CHAGANTI R,RAVI V,PHAM T D.Image-based malwarerepresentation approach with EfficientNet convolutional neural networks for effective malware classification[J].Journal of Information Security and Applications,2022,69:103306.
[23]NI S,QIAN Q,ZHANG R.Malware identification using visua-lization images and deep learning[J].Computers & Security,2018,77:871-885.
[24]CONTI M,KHANDHAR S,VINOD P.A few-shot malwareclassification approach for unknown family recognition using malware feature visualization[J].Computers & Security,2022,122:102887.
[25]PARISOT A,BENTO L M S,MACHADO R C S.Ransomware Detection:Leveraging Sandbox,Text Mining Techniques and Machine Learning[C]//2024 IEEE International Workshop on Metrology for Industry 40 & IoT(MetroInd40 & IoT).IEEE,2024:29-31.
[26]ZHOU Y,LIU Z,XUE J,et al.LM-cAPI:A Lite Model Based on API Core Semantic Information for Malware Classification[C]//International Conference on Applied Cryptography and Network Security.Springer,2024.
[27]LISA F T,ISLAM S R,KUMAR N M.Multi-modal machine learning model for interpretable malware classification[C]//World Conference on Explainable Artificial Intelligence.Sprin-ger,2024.
[28]LIAOW,LIU Z,DAI H,et al.Mask-guided BERT for few-shot text classification[J].Neurocomputing,2024,610:128576.
[29]LI H,CHEN S,WANG G,et al.Enhancing Few-Shot Malware Classification Through Joint Learning of Malware Images and Opcode Sequences[C]//2024 IEEE International Symposium on Parallel and Distributed Processing with Applications(ISPA).IEEE,2024.
[30]SRIVASTAVA S,SHARMA G.Omnivec:Learning robust representations with cross-modal sharing[C]//Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision.IEEE,2024.
[31]YACOUBY R,AXMAN D.Probabilistic extension of precision,recall,and f1 score for more thorough evaluation of classification models[C]//Proceedings of the First Workshop on Evaluation and Comparison of NLP Systems.IEEE,2020.
[32]VirusShare.com[EB/OL].(2025-06-25)[2025-06-25].https://virusshare.com/research.
[33]VirusTotal[EB/OL].(2025-06-25)[2025-06-25].https://www.virustotal.com/gui/home/upload.
[1] GAO Tai, REN Yanzhang, WANG Huiqing, LI Ying, WANG Bin. KGMamba:Gene Regulatory Network Prediction Model Based on Kolmogorov-Arnold Network Optimizing Graph Convolutional Network and Mamba [J]. Computer Science, 2026, 53(4): 101-111.
[2] ZHANG Xueqin, WANG Zhineng, LI Jinsheng, LU Yisong, LUO Fei. Key Node Identification in Temporal Social Networks Based on Deep Learning and Multi-feature Fusion [J]. Computer Science, 2026, 53(4): 143-154.
[3] GU Bokai, LIU Dun, SUN Yang. STWD-DLFRD:Multi-granularity Fake Review Detection via Sequential Three-way Decisions and Deep Learning [J]. Computer Science, 2026, 53(4): 188-196.
[4] ZHENG Cheng, BAN Qingqing. Knowledge-assisted and Reinforced Syntax-driven for Aspect-based Sentiment Analysis [J]. Computer Science, 2026, 53(4): 406-414.
[5] LI Zequn, DING Fei. Fatigue Driving Detection Based on Dual-branch Fusion and Segmented Domain AdaptationTransfer Learning [J]. Computer Science, 2026, 53(3): 78-87.
[6] FU Yukai, LI Qingzhen, DONG Zhixue, SHI Dongli, ZHAO Peng. Pedestrian Re-identification Methods Based on Limited Target Data and Deep Learning [J]. Computer Science, 2026, 53(3): 287-294.
[7] YU Ding, LI Zhangwei. Prediction Method of RNA Secondary Structure Based on Transformer Architecture [J]. Computer Science, 2026, 53(3): 375-382.
[8] DU Jiantong, GUAN Zeli, XUE Zhe. Multi-task Learning-based Ophthalmic Video Feature Fusion and Multi-dimensional Profiling [J]. Computer Science, 2026, 53(3): 383-391.
[9] SU Ruitao, REN Jiongjiong, CHEN Shaozhen. Deep Learning-based Neural Differential Distinguishers for GIFT-128 and ASCON [J]. Computer Science, 2026, 53(3): 453-458.
[10] HUANG Jing, WANG Teng, LIU Jian, HU Kai, PENG Xin, HUANG Yamin, WEN Yuanqiao. Multimodal Visual Detection for Underwater Sonar Target Images [J]. Computer Science, 2026, 53(2): 227-235.
[11] LIU Chenhong, LI Fenglian, YANG Jia, WANG Suzhe, CHEN Guijun. Boundary-focused Multi-scale Feature Fusion Network for Stroke Lesion Segmentation [J]. Computer Science, 2026, 53(2): 264-272.
[12] XI Penghui, WU Xiazhen, JIANG Wencong, FANG Liangda, HE Chaobo, GUAN Quanlong. Review of Personalized Educational Resource Recommendations [J]. Computer Science, 2026, 53(2): 1-15.
[13] HUANG Miaomiao, WANG Huiying, WANG Meixia, WANG Yejiang , ZHAO Yuhai. Review of Graph Embedding Learning Research:From Simple Graph to Complex Graph [J]. Computer Science, 2026, 53(1): 58-76.
[14] WANG Cheng, JIN Cheng. KAN-based Unsupervised Multivariate Time Series Anomaly Detection Network [J]. Computer Science, 2026, 53(1): 89-96.
[15] XUE Jingyan, XIA Jianan, HUO Ruili, LIU Jie, ZHOU Xuezhong. Review of Retinal Image Analysis Methods for OCT/OCTA Based on Deep Learning [J]. Computer Science, 2026, 53(1): 128-140.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!