On the Effectiveness of Image Processing Based Malware Detection Techniques

被引:14
作者
Bijitha, C., V [1 ]
Nath, Hiran, V [1 ]
机构
[1] Natl Inst Technol Calicut, Dept Comp Sci & Engn, Kozhikode 673601, Kerala, India
关键词
Malware; malware detection; malware visualization; image processing; survey; CLASSIFICATION; VISUALIZATION; FEATURES;
D O I
10.1080/01969722.2021.2020471
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The number of cyberattack incidents is undeniably growing by the day, with malware attacks being the significant contributor. Whether it is from worms, Trojan horses, or ransomware, malware analysis and detection techniques have undoubtedly a vital role in protecting the cyber world. Due to the limitations and time-consuming nature of other static and dynamic analysis strategies, researchers have looked into image processing-based malware analysis and detection methodologies in the recent past. The executables are converted to grayscale or color images, and image processing techniques are being used to classify them into benign and malicious categories and across their corresponding families. This paper presents a detailed study on malware executable images and their effectiveness in detecting and classifying malicious samples, focusing on different executable to image conversion strategies, feature engineering approaches, and the classification models in use. A detailed insight on the performance overview and future perspective of various image-based malware detection methods is also presented.
引用
收藏
页码:615 / 640
页数:26
相关论文
共 62 条
[1]  
Anderson H.S, 2018, ARXIV PREPRINT ARXIV
[2]  
[Anonymous], 2021, CYBER THREAT REPORT
[3]  
[Anonymous], 2021, CYBER SECURITY REPOR
[4]  
[Anonymous], 2021, MALEVIS DATASET HOME
[5]  
Arefkhani M, 2015, 2015 9TH IRANIAN CONFERENCE ON MACHINE VISION AND IMAGE PROCESSING (MVIP), P214, DOI 10.1109/IranianMVIP.2015.7397539
[6]   A New Malware Classification Framework Based on Deep Learning Algorithms [J].
Aslan, Omer ;
Yilmaz, Abdullah Asim .
IEEE ACCESS, 2021, 9 :87936-87951
[7]  
Bensaoud A., 2020, Int J Netw Secur, V22, P1022, DOI DOI 10.48550/ARXIV.2010.16108
[8]  
Bijitha C. V., 2020, Secure Knowledge Management In Artificial Intelligence Era: 8th International Conference, SKM 2019. Communications in Computer and Information Science (1186), P55, DOI 10.1007/978-981-15-3817-9_4
[9]   On the resemblance and containment of documents [J].
Broder, AZ .
COMPRESSION AND COMPLEXITY OF SEQUENCES 1997 - PROCEEDINGS, 1998, :21-29
[10]   Assessing and Improving Malware Detection Sustainability through App Evolution Studies [J].
Cai, Haipeng .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2020, 29 (02)