An Opcode-Based Malware Detection Model Using Supervised Learning Algorithms

被引:0
|
作者
Samantray, Om Prakash [1 ]
Tripathy, Satya Narayan [2 ]
机构
[1] Raghu Inst Technol, Visakhapatnam, Andhra Pradesh, India
[2] Berhampur Univ, Brahmapur, India
关键词
Feature Extraction; Feature Selection; Machine Learning; Malicious Code; MalwareAnalysis; Malware Detection; Operation Code; Random Forest; Static Analysis;
D O I
10.4018/IJISP.2021100102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
There are several malware detection techniques available that are based on a signature-based approach. This approach can detect known malware very effectively but sometimes may fail to detect unknown or zero-day attacks. In this article, the authors have proposed a malware detection model that uses operation codes of malicious and benign executables as the feature. The proposed model uses opcode extract and count (OPEC) algorithm to prepare the opcode feature vector for the experiment. Most relevant features are selected using extra tree classifier feature selection technique and then passed through several supervised learning algorithms like support vector machine, naive bayes, decision tree, random forest, logistic regression, and k-nearest neighbour to build classification models for malware detection. The proposed model has achieved a detection accuracy of 98.7%, which makes this model better than many of the similar works discussed in the literature.
引用
收藏
页码:18 / 30
页数:13
相关论文
共 50 条
  • [21] Malware detection based on semi-supervised learning with malware visualization
    Gao, Tan
    Zhao, Lan
    Li, Xudong
    Chen, Wen
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2021, 18 (05) : 5995 - 6011
  • [22] Robust IoT Malware Detection and Classification Using Opcode Category Features on Machine Learning
    Lee, Hyunjong
    Kim, Sooin
    Baek, Dongheon
    Kim, Donghoon
    Hwang, Doosung
    IEEE ACCESS, 2023, 11 (18855-18867) : 18855 - 18867
  • [23] Evolved IoT Malware Detection using Opcode Category Sequence through Machine Learning
    Moon, Sunghyun
    Kim, Youngho
    Lee, Hyunjong
    Kim, Donghoon
    Hwang, Doosung
    2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022), 2022,
  • [24] Dynamic malware detection based on supervised contrastive learning
    Yang, Shumian
    Yang, Yongqi
    Zhao, Dawei
    Xu, Lijuan
    Li, Xin
    Yu, Fuqiang
    Hu, Jiarui
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [25] Machine-Learning-Based Malware Detection for Virtual Machine by Analyzing Opcode Sequence
    Wang, Xiao
    Zhang, Jianbiao
    Zhang, Ai
    ADVANCES IN BRAIN INSPIRED COGNITIVE SYSTEMS, BICS 2018, 2018, 10989 : 717 - 726
  • [26] Zero-day malware detection based on supervised learning algorithms of API call signatures
    Alazab, Mamoun
    Venkatraman, Sitalakshmi
    Watters, Paul
    Alazab, Moutaz
    Conferences in Research and Practice in Information Technology Series, 2010, 121 : 171 - 182
  • [27] IRMD: Malware variant Detection using opcode Image Recognition
    Zhang, Jixin
    Qin, Zheng
    Yin, Hui
    Ou, Lu
    Hu, Yupeng
    2016 IEEE 22ND INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2016, : 1175 - 1180
  • [28] Clustering based opcode graph generation for malware variant detection
    Wai, Fok Kar
    Thing, Vrizlynn L. L.
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [29] Sequential opcode embedding-based malware detection method
    Kakisim, Arzu Gorgulu
    Gulmez, Sibel
    Sogukpinar, Ibrahim
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
  • [30] Application of Deep Belief Networks for Opcode Based Malware Detection
    Ding, Yuxin
    Chen, Sheng
    Xu, Jun
    2016 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2016, : 3901 - 3908