Toward accurate and intelligent detection of malware

被引:4
作者
Arfeen, Asad [1 ]
Khan, Zunair Ahmed [1 ]
Uddin, Riaz [2 ]
Ahsan, Usama [1 ]
机构
[1] NED Univ Engn & Technol, Natl Ctr Cyber Secur, Dept Comp & Informat Syst Engn, Karachi, Pakistan
[2] NED Univ Engn & Technol, Natl Ctr Robot & Automat, Dept Elect Engn, Karachi, Pakistan
关键词
artificial intelligence; deep learning; dynamic analysis; hardware based malware detection; machine learning; malware; malware detection; security analysis; static analysis; SIGNATURE GENERATION; CLASSIFICATION;
D O I
10.1002/cpe.6652
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Malware is a constant threat to the safety of the public Internet and private networks. It also affects the security of endpoint devices. An infected endpoint device can take part in aggressive or slow distributed denial of service attacks globally. Polymorphic malware has rendered traditional signature-based detection ineffective. Hence the efforts to identify malware have been focused on behavioral modeling to identify and classify malware. This behavioral identification paved the way for artificial intelligence (AI) in cybersecurity. AI can detect a zero-day attack and malware, but it suffers from several false positives. This article presents an extensive analysis of traditional and AI-based methods for malware detection and related challenges. AI is vulnerable to attacks, such as dataset poisoning and adversarial data input, which can reduce model accuracy and increase false negatives. AI has helped to improve malware detection and reduce manual work through automation of feature extraction and feature selection. It is also beneficial to create models that are less prone to malware variations and capture the malicious behavior holistically. This article explores the transition of malware detection from traditional to AI-based techniques. Furthermore, it also explains how some conventional approaches are still relevant today in terms of detection speed.
引用
收藏
页数:19
相关论文
共 86 条
[1]   Malware classification and composition analysis: A survey of recent developments [J].
Abusitta, Adel ;
Li, Miles Q. ;
Fung, Benjamin C. M. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
[2]  
Accenture, 2019, Cost of Cybercrime Study | 9th Annual | Accenture
[3]  
Adkins F., 2013, HEURISTIC MALWARE DE, P1
[4]  
Akshara P., 2021, SN COMPUT SCI, V2, P1
[5]   Sliding window and control flow weight for metamorphic malware detection [J].
Alam, Shahid ;
Sogukpinar, Ibrahim ;
Traore, Issa ;
Horspool, R. Nigel .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (02) :75-88
[6]  
[Anonymous], 2016, PANDALABS REPORTS CR
[7]  
[Anonymous], 2013, ACM SIGARCH computer architecture news
[8]  
[Anonymous], 2020, MACHINE LEARNING MET
[9]  
[Anonymous], 2018, McAfee Labs Threats Report
[10]  
[Anonymous], 2011, STC '11