Survey of Malware Analysis through Control Flow Graph using Machine Learning

被引:0
|
作者
Mitra, Shaswata [1 ]
Torri, Stephen A. [1 ]
Mittal, Sudip [1 ]
机构
[1] Mississippi State Univ, Dept Comp Sci & Engn, Mississippi State, MS 39762 USA
关键词
Cybersecurity; Malware Analysis; Control Flow Graph; Machine Learning;
D O I
10.1109/TrustCom60117.2023.00212
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malware is a significant threat to the security of computer systems and networks, requiring sophisticated techniques to analyze its behavior and functionality for detection. Due to their rapid evolution, traditional signature-based malware detection methods have become ineffective in detecting new and unknown malware. One of the most promising techniques to overcome the limitations of signature-based detection is using control flow graphs (CFGs). CFGs leverage the structural information of a program to represent the possible paths of execution as a graph, where nodes represent instructions and edges represent control flow dependencies. Machine learning (ML) algorithms extract these features from CFGs and classify them as malicious or benign. In this survey, we aim to review some state-of-the-art methods for malware detection through CFGs using ML, focusing on the different ways of extracting, representing, and classifying. Specifically, we present a comprehensive overview of various CFG features and different ML algorithms applied to CFG-based malware detection. We provide an in-depth analysis of the challenges and limitations of these approaches, as well as suggest potential solutions to address persisting open problems and promising future directions for research in this field.
引用
收藏
页码:1554 / 1561
页数:8
相关论文
共 50 条
  • [1] Survey of machine learning techniques for malware analysis
    Ucci, Daniele
    Aniello, Leonardo
    Baldoni, Roberto
    COMPUTERS & SECURITY, 2019, 81 : 123 - 147
  • [2] Integrated Malware Analysis Using Machine Learning
    Singh, Akash Kumar
    Jain, Aruna
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 347 - 354
  • [3] Behavior Analysis of Malware Using Machine Learning
    Dhammi, Arshi
    Singh, Maninder
    2015 EIGHTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2015, : 481 - 486
  • [4] Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability
    Fairbanks, Jeffrey
    Orbe, Andres
    Patterson, Christine
    Layne, Janet
    Serra, Edoardo
    Scheepers, Marion
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 5602 - 5608
  • [5] Android Malware Analysis Approach Based on Control Flow Graphs and Machine Learning Algorithms
    Atici, Mehmet Ali
    Sagiroglu, Seref
    Dogru, Ibrahim Alper
    2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, : 26 - 31
  • [6] A Survey on Mobile Malware Detection Methods using Machine Learning
    Kambar, Mina Esmail Zadeh Nojoo
    Esmaeilzadeh, Armin
    Kim, Yoohwan
    Taghva, Kazem
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 215 - 221
  • [7] Malware Variant Detection and Classification Using Control Flow Graph
    Shin, Donghwi
    Lee, Kwangwoo
    Won, Dongho
    CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2011, 206 : 174 - 181
  • [8] Detecting Malware in Cyberphysical Systems Using Machine Learning: a Survey
    Montes, F.
    Bermejo, J.
    Sanchez, L. E.
    Bermejo, J. R.
    Sicilia, J. A.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (03) : 1119 - 1139
  • [9] Metamorphic Malware Detection using Control Flow Graph Mining
    Eskandari, Mojtaba
    Hashemi, Sattar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (12): : 1 - 6
  • [10] A Survey on Malware Detection with Graph Representation Learning
    Bilot, Tristan
    El Madhoun, Nour
    Al Agha, Khaldoun
    Zouaoui, Anis
    ACM COMPUTING SURVEYS, 2024, 56 (11)