Visual malware detection using local malicious pattern

被引:0
|
作者
Hashem Hashemi
Ali Hamzeh
机构
[1] Shiraz University,Department of Computer Science and Engineering
关键词
Malware Detection; Benign Files; Micropatterns; Malware Authors; Machine Vision Field;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, malware authors have had significant developments in offering new generations of malware and have tried to use different methods to make malware detection hard, so detecting malware has become one of the most important challenges for the security of computer systems. These developments have made detection of malware using conventional methods rather difficult and in many cases impossible. Thus, inventing new methods for detecting malware is critical. In this paper, a new method is proposed to detect unknown malware based on micro-patterns within the executable files. In the proposed method, for extracting required micro-patterns, one of the well-known methods in machine vision field is used. The proposed method works as follows: first executable files are converted into digital images; second, these images are used to extract visual features of the executable files; finally, machine learning methods are used to detect malware. The main idea of the proposed method is based on differences in the behavior and functionality of malware and benign files, where different behavior results in different micro-patterns which can be used to distinguish between malware and benign files. Accordingly, in this paper a textural image classification method is used which aims to extract micro-patterns of digital textural images, to detect and extract micro-patterns of executable files and use them to detect malware.
引用
收藏
页码:1 / 14
页数:13
相关论文
共 50 条
  • [1] Visual malware detection using local malicious pattern
    Hashemi, Hashem
    Hamzeh, Ali
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2019, 15 (01) : 1 - 14
  • [2] Visual malware classification using local and global malicious pattern
    Naeem, Hamad
    Guo, Bing
    Naeem, Muhammad Rashid
    Vasan, Danish
    Journal of Computers (Taiwan), 2019, 30 (06): : 73 - 83
  • [3] Malicious sequential pattern mining for automatic malware detection
    Fan, Yujie
    Ye, Yanfang
    Chen, Lifei
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 52 : 16 - 25
  • [4] Android Malware Detection Using Local Binary Pattern and Principal Component Analysis
    Wu, Qixin
    Qin, Zheng
    Zhang, Jinxin
    Yin, Hui
    Yang, Guangyi
    Hu, Kuangsheng
    DATA SCIENCE, PT 1, 2017, 727 : 262 - 275
  • [5] Detection of Malware and Malicious Executables Using E-Birch Algorithm
    Dutta, Ashit Kumar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 124 - 126
  • [6] Detection of Running Malware Before it Becomes Malicious
    Banin, Sergii
    Dyrkolbotn, Geir Olav
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2020), 2020, 12231 : 57 - 73
  • [7] MsDroid: Identifying Malicious Snippets for Android Malware Detection
    He, Yiling
    Li, Yiping
    Wu, Lei
    Yang, Ziqi
    Ren, Kui
    Qin, Zhan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2025 - 2039
  • [8] On the use of artificial malicious patterns for android malware detection
    Jerbi, Manel
    Dagdia, Zaineb Chelly
    Bechikh, Slim
    Ben Said, Lamjed
    COMPUTERS & SECURITY, 2020, 92 (92)
  • [9] MalFire: Malware Firewall for Malicious Content Detection and Protection
    Yost, Wyatt
    Jaiswal, Chetan
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 428 - +
  • [10] A layered classification for malicious function identification and malware detection
    Liu, Ting
    Guan, Xiaohong
    Qu, Yu
    Sun, Yanan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (11): : 1169 - 1179