Survey of Malware Analysis through Control Flow Graph using Machine Learning

被引:0
|
作者
Mitra, Shaswata [1 ]
Torri, Stephen A. [1 ]
Mittal, Sudip [1 ]
机构
[1] Mississippi State Univ, Dept Comp Sci & Engn, Mississippi State, MS 39762 USA
关键词
Cybersecurity; Malware Analysis; Control Flow Graph; Machine Learning;
D O I
10.1109/TrustCom60117.2023.00212
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malware is a significant threat to the security of computer systems and networks, requiring sophisticated techniques to analyze its behavior and functionality for detection. Due to their rapid evolution, traditional signature-based malware detection methods have become ineffective in detecting new and unknown malware. One of the most promising techniques to overcome the limitations of signature-based detection is using control flow graphs (CFGs). CFGs leverage the structural information of a program to represent the possible paths of execution as a graph, where nodes represent instructions and edges represent control flow dependencies. Machine learning (ML) algorithms extract these features from CFGs and classify them as malicious or benign. In this survey, we aim to review some state-of-the-art methods for malware detection through CFGs using ML, focusing on the different ways of extracting, representing, and classifying. Specifically, we present a comprehensive overview of various CFG features and different ML algorithms applied to CFG-based malware detection. We provide an in-depth analysis of the challenges and limitations of these approaches, as well as suggest potential solutions to address persisting open problems and promising future directions for research in this field.
引用
收藏
页码:1554 / 1561
页数:8
相关论文
共 50 条
  • [41] Cash flow prediction of a bank deposit using scalable graph analysis and machine learning
    Kawahara, Ryo
    Takeuchi, Mikio
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 1647 - 1656
  • [42] Enhancing Malware Detection Through Machine Learning Using XAI with SHAP Framework
    Basheer, Nihala
    Pranggono, Bernardi
    Islam, Shareeful
    Papastergiou, Spyridon
    Mouratidis, Haralambos
    ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, PT I, AIAI 2024, 2024, 711 : 316 - 329
  • [43] Method of Detecting Malware Through Analysis of Opcodes Frequency with Machine Learning Technique
    Woo, Sang-Uk
    Kim, Dong-Hee
    Chung, Tai-Myoung
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 1019 - 1024
  • [44] Android Malware Detection Using Hybrid Analysis and Machine Learning Technique
    Yang, Fan
    Zhuang, Yi
    Wang, Jun
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 565 - 575
  • [45] An Experimental Analysis on Malware Detection in Executable Files using Machine Learning
    Sharma, Anurag
    Mohanty, Suman
    Islam, Md Ruhul
    2021 8TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS (ICSCC), 2021, : 178 - 182
  • [46] Graph Embedding based Familial Analysis of Android Malware using Unsupervised Learning
    Fan, Ming
    Luo, Xiapu
    Liu, Jun
    Wang, Meng
    Nong, Chunyin
    Zheng, Qinghua
    Liu, Ting
    2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019), 2019, : 771 - 782
  • [47] Detecting self-mutating malware using control-flow graph matching
    Bruschi, Danilo
    Martignoni, Lorenzo
    Monga, Mattia
    DETECTION OF INTRUSIONS AND MALWARE & VULNERABILITY ASSESSMENT, PROCEEDINGS, 2006, 4064 : 129 - 143
  • [48] Analysis of Android Malware Detection Performance using Machine Learning Classifiers
    Ham, Hyo-Sik
    Choi, Mi-Jung
    2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS, 2013, : 492 - 497
  • [49] A Study on the Effect of Feature Selection on Malware Analysis using Machine Learning
    Babaagba, Kehinde Oluwatoyin
    Adesanya, Samuel Olumide
    PROCEEDINGS OF 2019 8TH INTERNATIONAL CONFERENCE ON EDUCATIONAL AND INFORMATION TECHNOLOGY (ICEIT 2019), 2019, : 51 - 55
  • [50] To Identify Malware Using Machine Learning Algorithms
    Pujari, Shivam
    Mandoria, H. L.
    Shrivastava, R. P.
    Singh, Rajesh
    COMPUTING SCIENCE, COMMUNICATION AND SECURITY, 2022, 1604 : 117 - 127