Study of a Hybrid Approach Towards Malware Detection in Executable Files

被引:0
作者
Akshara P. [1 ]
Rudra B. [1 ]
机构
[1] National Institute of Technology Karnataka, Surathkal
关键词
Cyber security; Hybrid feature extraction; Malware detection;
D O I
10.1007/s42979-021-00672-y
中图分类号
学科分类号
摘要
With the ever-increasing number of Internet users in this digital age, exposure to malicious attacks is increasing. Every day, large volumes of malicious content are generated to exploit 0-day vulnerabilities. There is every possibility of downloading malicious files unintentionally, which could corrupt the system and user data. With the advancements in technology and growing dependence on digital data, malicious software detection has become a crucial task. The existing approaches need modifications to support and detect the latest attacks. Recently, artificial intelligence-based malicious file detection methods have been proposed. In the past, most of the works analyzed the executable file features and visual features from their corresponding images independently. Additionally, image-based analysis has been exploited for categorical classification, i.e., finding the family once it is known to be malware. We propose a CNN-based model that extracts visual features from malware images, which outperforms existing approaches on a benchmark dataset like MalImg. We study the effect of using a hybrid feature set containing these visual features integrated with statically obtained opcode frequencies for the detection of malware. Our experiments on standard datasets demonstrate that there is no significant performance improvement using this hybrid approach. © 2021, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 25 条
[1]  
Rathore H., Agarwal S., Sahay S., Sewak M., Malware detection using machine learning and deep learning, 6Th International Conference, BDA 2018, Warangal, India, December, pp. 18-21, (2018)
[2]  
Cavallaro L., Saxena P., Sekar R., On the limits of information flow techniques for malware analysis and containment, Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2008. Lecture Notes in Computer Science, 5137
[3]  
Chen L., Deep transfer learning for static malware classification. 2018. arxiv: 1812.07606.pdf
[4]  
Nataraj L., Karthikeyan S., Jacob G., Manjunath B., Malware images: Visualization and automatic classification, (2011)
[5]  
Schultz M., Eskin E., Zadok F., Stolfo S., Data mining methods for detection of new malicious executables, Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 38-49, (2001)
[6]  
Shabtai A., Moskovitch R., Elovici Y., Glezer C., Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey, Inf Secur Tech Rep, 14, 1, pp. 16-29, (2009)
[7]  
Firdausi I., Lim C., Erwin A., Nugroho A.S., Analysis of machine learning techniques used in behavior-based malware detection, Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, Jakarta, pp. 201-203, (2010)
[8]  
Ahmadi M., Ulyanov D., Semenov S., Trofimov M., Giacinto G., Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification., (2016)
[9]  
Santos I., Devesa J., Brezo F., Nieves J., Bringas P.O.P.E.M., A static-dynamic approach for machine-learning-based malware detection, (2013)
[10]  
Sravani Y., Vikash S., Troia D.F., Stamp M., Deep Learning versus Gist Descriptors for Image-Based Malware Classification, (2018)