Unlocking the Power of Machine Learning in Cybersecurity Forensics: Identifying Malicious Files

被引:0
作者
Yavas, Cemil Emre [1 ]
Das, Jiban Krishna [1 ]
Akpomedaye, Bennett [1 ]
Chen, Lei [1 ]
Ji, Yiming [1 ]
机构
[1] Georgia Southern Univ, Dept Informat Technol, Statesboro, GA 30458 USA
来源
SECURITY AND MANAGEMENT AND WIRELESS NETWORKS, SAM 2024, ICWN 2024 | 2025年 / 2254卷
基金
美国国家科学基金会;
关键词
Cybersecurity; Machine Learning; Malicious Files; Digital Forensics; Cyber Threats; File System Analysis; Hexadecimal Code Analysis;
D O I
10.1007/978-3-031-86637-1_10
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Our research introduces a novel method for determining the originating software of digital images, which significantly advances digital forensic analysis capabilities. This method involves transforming images into their hexadecimal code representations, thereby stripping away metadata and making the files unrecognizable by conventional identification techniques. Through a meticulous analysis of these hex codes, broken down into 2-character substrings, we construct detailed feature vectors representing the frequency of each substring. Utilizing a diverse array of machine learning models, including RandomForestClassifier, LogisticRegression, and others, our approach successfully identifies the software used to create the images, such as PowerPoint, GIMP, Picasa, and the online tool Batchtools.pro, with an impressive accuracy rate between 97% and 100%. Moreover, this technique enables the detection and flagging of files containing malicious content with nearly perfect accuracy. Our approach not only enhances the understanding of a file's digital lineage but also offers a new mechanism in digital forensics, providing a robust tool for both identifying the software used in file creation and detecting malicious alterations.
引用
收藏
页码:123 / 139
页数:17
相关论文
共 35 条
[1]  
Agrawal R., 2018, MILCOM 2018, P1
[2]   Malicious File Detection Method Using Machine Learning and Interworking with MITRE ATT&CK Framework [J].
Ahn, Gwanghyun ;
Kim, Kookjin ;
Park, Wonhyung ;
Shin, Dongkyoo .
APPLIED SCIENCES-BASEL, 2022, 12 (21)
[3]   Deep learning for cyber threat detection in IoT networks: A review [J].
Aldhaheri A. ;
Alwahedi F. ;
Ferrag M.A. ;
Battah A. .
Internet of Things and Cyber-Physical Systems, 2024, 4 :110-128
[4]  
AlMahadeen A., 2023, PDF malware detection using machine learning
[5]   Detecting a malicious executable without prior knowledge of its patterns [J].
Cai, DM ;
Theiler, J ;
Gokhale, M .
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 :1-12
[6]   Malicious Powershell Detection Using Graph Convolution Network [J].
Choi, Sunoh .
APPLIED SCIENCES-BASEL, 2021, 11 (14)
[7]   Malicious PowerShell Detection Using Attention against Adversarial Attacks [J].
Choi, Sunoh .
ELECTRONICS, 2020, 9 (11) :1-14
[8]   Attention-Based Automated Feature Extraction for Malware Analysis [J].
Choi, Sunoh ;
Bae, Jangseong ;
Lee, Changki ;
Kim, Youngsoo ;
Kim, Jonghyun .
SENSORS, 2020, 20 (10)
[9]   MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images [J].
Cohen, Aviad ;
Nissim, Nir ;
Elovici, Yuval .
IEEE ACCESS, 2020, 8 :19997-20011
[10]  
Edzuan Zainodin M., 2022, JOIV Int. J. Inf. Vis., V6, P856