An Opcode-Based Malware Detection Model Using Supervised Learning Algorithms

被引:0
|
作者
Samantray, Om Prakash [1 ]
Tripathy, Satya Narayan [2 ]
机构
[1] Raghu Inst Technol, Visakhapatnam, Andhra Pradesh, India
[2] Berhampur Univ, Brahmapur, India
关键词
Feature Extraction; Feature Selection; Machine Learning; Malicious Code; MalwareAnalysis; Malware Detection; Operation Code; Random Forest; Static Analysis;
D O I
10.4018/IJISP.2021100102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
There are several malware detection techniques available that are based on a signature-based approach. This approach can detect known malware very effectively but sometimes may fail to detect unknown or zero-day attacks. In this article, the authors have proposed a malware detection model that uses operation codes of malicious and benign executables as the feature. The proposed model uses opcode extract and count (OPEC) algorithm to prepare the opcode feature vector for the experiment. Most relevant features are selected using extra tree classifier feature selection technique and then passed through several supervised learning algorithms like support vector machine, naive bayes, decision tree, random forest, logistic regression, and k-nearest neighbour to build classification models for malware detection. The proposed model has achieved a detection accuracy of 98.7%, which makes this model better than many of the similar works discussed in the literature.
引用
收藏
页码:18 / 30
页数:13
相关论文
共 50 条
  • [1] Analysis and Comparison of Opcode-based Malware Detection Approaches
    Nar, Mert
    Kakisim, Arzu Gorgulu
    Carkaci, Necmettin
    Yavuz, Melek Nurten
    Sogukpinar, Ibrahim
    2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 498 - 503
  • [2] Deep learning-aided runtime opcode-based Windows malware detection
    Enes Sinan Parildi
    Dimitrios Hatzinakos
    Yuri Lawryshyn
    Neural Computing and Applications, 2021, 33 : 11963 - 11983
  • [3] Deep learning-aided runtime opcode-based Windows malware detection
    Parildi, Enes Sinan
    Hatzinakos, Dimitrios
    Lawryshyn, Yuri
    NEURAL COMPUTING & APPLICATIONS, 2021, 33 (18): : 11963 - 11983
  • [4] An opcode-based technique for polymorphic Internet of Things malware detection
    Darabian, Hamid
    Dehghantanha, Ali
    Hashemi, Sattar
    Homayoun, Sajad
    Choo, Kim-Kwang Raymond
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (06):
  • [5] A malware variants detection methodology with an opcode-based feature learning method and a fast density-based clustering algorithm
    Yin, Hui
    Zhang, Jixin
    Qin, Zheng
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 21 (01) : 19 - 29
  • [6] An Opcode-Based Vulnerability Detection of Smart Contracts
    Sui, Jia
    Chu, Lili
    Bao, Han
    APPLIED SCIENCES-BASEL, 2023, 13 (13):
  • [7] Opcode-Sequence-Based Semi-supervised Unknown Malware Detection
    Santos, Igor
    Sanz, Borja
    Laorden, Carlos
    Brezo, Felix
    Bringas, Pablo G.
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS, 2011, 6694 : 50 - 57
  • [8] Malware Detection Based On Opcode Frequency
    Yewale, Abhijit
    Singh, Maninder
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2016, : 646 - 649
  • [9] Graph-Based Malware Detection Using Opcode Sequences
    Gulmez, Sibel
    Sogukpinar, Ibrahim
    9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [10] Malware Detection Using Markov Blanket Based on Opcode Sequences
    Divandari, Hamid
    Pechaz, Bassir
    Jahan, Majid Vafaie
    SECOND INTERNATIONAL CONGRESS ON TECHNOLOGY, COMMUNICATION AND KNOWLEDGE (ICTCK 2015), 2015, : 564 - 569