Malware Detection Issues, Challenges, and Future Directions: A Survey

被引:61
作者
Aboaoja, Faitouri A. [1 ]
Zainal, Anazida [1 ]
Ghaleb, Fuad A. [1 ]
Al-rimy, Bander Ali Saleh [1 ]
Eisa, Taiseer Abdalla Elfadil [2 ]
Elnour, Asma Abbas Hassan [2 ]
机构
[1] Univ Teknol Malaysia, Fac Engn, Sch Comp, Johor Baharu 81300, Johor, Malaysia
[2] King Khalid Univ, Dept Informat Syst Girls Sect, Mahayil 62529, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 17期
关键词
malware detection and classification models; malware analysis approaches; malware detection approaches; malware features; feature engineering; DYNAMIC-ANALYSIS; LEARNING TECHNIQUES; REAL-TIME; CLASSIFICATION; FRAMEWORK; SYSTEM; TRENDS; MODEL;
D O I
10.3390/app12178482
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The evolution of recent malicious software with the rising use of digital services has increased the probability of corrupting data, stealing information, or other cybercrimes by malware attacks. Therefore, malicious software must be detected before it impacts a large number of computers. Recently, many malware detection solutions have been proposed by researchers. However, many challenges limit these solutions to effectively detecting several types of malware, especially zero-day attacks due to obfuscation and evasion techniques, as well as the diversity of malicious behavior caused by the rapid rate of new malware and malware variants being produced every day. Several review papers have explored the issues and challenges of malware detection from various viewpoints. However, there is a lack of a deep review article that associates each analysis and detection approach with the data type. Such an association is imperative for the research community as it helps to determine the suitable mitigation approach. In addition, the current survey articles stopped at a generic detection approach taxonomy. Moreover, some review papers presented the feature extraction methods as static, dynamic, and hybrid based on the utilized analysis approach and neglected the feature representation methods taxonomy, which is considered essential in developing the malware detection model. This survey bridges the gap by providing a comprehensive state-of-the-art review of malware detection model research. This survey introduces a feature representation taxonomy in addition to the deeper taxonomy of malware analysis and detection approaches and links each approach with the most commonly used data types. The feature extraction method is introduced according to the techniques used instead of the analysis approach. The survey ends with a discussion of the challenges and future research directions.
引用
收藏
页数:29
相关论文
共 118 条
[1]   Malware classification and composition analysis: A survey of recent developments [J].
Abusitta, Adel ;
Li, Miles Q. ;
Fung, Benjamin C. M. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
[2]   A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection [J].
Ahmed, Yahye Abukar ;
Kocer, Baris ;
Huda, Shamsul ;
Al-rimy, Bander Ali Saleh ;
Hassan, Mohammad Mehedi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 167
[3]   Enhancing unsupervised neural networks based text summarization with word embedding and ensemble learning [J].
Alami, Nabil ;
Meknassi, Mohammed ;
En-nahnahi, Noureddine .
EXPERT SYSTEMS WITH APPLICATIONS, 2019, 123 :195-211
[4]   MALGRA: Machine Learning and N-Gram Malware Feature Extraction and Detection System [J].
Ali, Muhammad ;
Shiaeles, Stavros ;
Bendiab, Gueltoum ;
Ghita, Bogdan .
ELECTRONICS, 2020, 9 (11) :1-20
[5]   DNS rule-based schema to botnet detection [J].
Alieyan, Kamal ;
Almomani, Ammar ;
Anbar, Mohammed ;
Alauthman, Mohammad ;
Abdullah, Rosni ;
Gupta, B. B. .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) :545-564
[6]  
Allen F. E., 1970, ACM Sigplan Not., P1, DOI DOI 10.1145/390013.808479
[7]  
Alsmadi Tibra, 2021, 2021 International Conference on Information Technology (ICIT), P371, DOI 10.1109/ICIT52682.2021.9491765
[8]   Contextual Identification of Windows Malware through Semantic Interpretation of API Call Sequence [J].
Amer, Eslam ;
El-Sappagh, Shaker ;
Hu, Jong Wan .
APPLIED SCIENCES-BASEL, 2020, 10 (21) :1-15
[9]   A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence [J].
Amer, Eslam ;
Zelinka, Ivan .
COMPUTERS & SECURITY, 2020, 92
[10]  
[Anonymous], 2011, P 8 INT S VIS CYB SE, DOI 10.1145/2016904.2016908