Impact of Portable Executable Header Features on Malware Detection Accuracy

被引:2
作者
Al-Khshali, Hasan H. [1 ]
Ilyas, Muhammad [2 ]
机构
[1] Altinbas Univ, Elect & Comp Engn, Istanbul, Turkiye
[2] Altinbas Univ, Elect & Elect Engn, Istanbul, Turkiye
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 74卷 / 01期
关键词
AI driven cybersecurity; artificial intelligence; cybersecurity; Decision Tree; Neural Network Multi-Layer Perceptron Classifier; portable executable (PE) file header features;
D O I
10.32604/cmc.2023.032182
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One aspect of cybersecurity, incorporates the study of Portable Exe-cutables (PE) files maleficence. Artificial Intelligence (AI) can be employed in such studies, since AI has the ability to discriminate benign from malicious files. In this study, an exclusive set of 29 features was collected from trusted implementations, this set was used as a baseline to analyze the presented work in this research. A Decision Tree (DT) and Neural Network Multi -Layer Perceptron (NN-MLPC) algorithms were utilized during this work. Both algorithms were chosen after testing a few diverse procedures. This work implements a method of subgrouping features to answer questions such as, which feature has a positive impact on accuracy when added? Is it possible to determine a reliable feature set to distinguish a malicious PE file from a benign one? when combining features, would it have any effect on malware detection accuracy in a PE file? Results obtained using the proposed method were improved and carried few observations. Generally, the obtained results had practical and numerical parts, for the practical part, the number of features and which features included are the main factors impacting the calculated accuracy, also, the combination of features is as crucial in these calculations. Numerical results included, finding accuracies with enhanced values, for example, NN_MLPC attained 0.979 and 0.98; for DT an accuracy of 0.9825 and 0.986 was attained.
引用
收藏
页码:153 / 178
页数:26
相关论文
共 41 条
  • [1] Al-Khshali HH, 2020, 2020 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), P1115, DOI 10.1109/SSCI47803.2020.9308507
  • [2] [Anonymous], 2009, INT J COMPUTER ELECT
  • [3] [Anonymous], 2009, INT J COMPUTER SCI I
  • [4] Malware Classification of Portable Executables using Tree-Based Ensemble Machine Learning
    Atluri, Venkata
    [J]. 2019 IEEE SOUTHEASTCON, 2019,
  • [5] A Malware Detection Scheme Based on Mining Format Information
    Bai, Jinrong
    Wang, Junfeng
    Zou, Guozhong
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [6] Carrera E, 2018, BENIGN MALICIOUS PE
  • [7] Clark J., 2020, 2020 IEEE SOUTHEASTC, P1
  • [8] Static Malware Detection Using Stacked BiLSTM and GPT-2
    Demirci, Deniz
    Sahin, Nazenin
    Sirlancis, Melih
    Acarturk, Cengiz
    [J]. IEEE ACCESS, 2022, 10 : 58488 - 58502
  • [9] Devi Dhruwajita., 2012, INT J COMPUTER THEOR, V4, P476, DOI [10.7763/IJCTE.2012.V4.512, DOI 10.7763/IJCTE.2012.V4.512]
  • [10] Portable Executable Malware Classifier Using Long Short Term Memory and Sophos-ReversingLabs 20 Million Dataset
    Diaz, Julianne Alyson
    Bandala, Argel
    [J]. 2021 IEEE REGION 10 CONFERENCE (TENCON 2021), 2021, : 881 - 884