Visual malware detection using local malicious pattern

被引:0
|
作者
Hashem Hashemi
Ali Hamzeh
机构
[1] Shiraz University,Department of Computer Science and Engineering
关键词
Malware Detection; Benign Files; Micropatterns; Malware Authors; Machine Vision Field;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, malware authors have had significant developments in offering new generations of malware and have tried to use different methods to make malware detection hard, so detecting malware has become one of the most important challenges for the security of computer systems. These developments have made detection of malware using conventional methods rather difficult and in many cases impossible. Thus, inventing new methods for detecting malware is critical. In this paper, a new method is proposed to detect unknown malware based on micro-patterns within the executable files. In the proposed method, for extracting required micro-patterns, one of the well-known methods in machine vision field is used. The proposed method works as follows: first executable files are converted into digital images; second, these images are used to extract visual features of the executable files; finally, machine learning methods are used to detect malware. The main idea of the proposed method is based on differences in the behavior and functionality of malware and benign files, where different behavior results in different micro-patterns which can be used to distinguish between malware and benign files. Accordingly, in this paper a textural image classification method is used which aims to extract micro-patterns of digital textural images, to detect and extract micro-patterns of executable files and use them to detect malware.
引用
收藏
页码:1 / 14
页数:13
相关论文
共 50 条
  • [21] Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition
    Sepideh Niktabe
    Arash Habibi Lashkari
    Dilli Prasad Sharma
    International Journal of Information Security, 2024, 23 : 1293 - 1316
  • [22] Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition
    Niktabe, Sepideh
    Lashkari, Arash Habibi
    Sharma, Dilli Prasad
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 1293 - 1316
  • [23] Efficient Malicious Domain Detection Using Word Segmentation and BM Pattern Matching
    Gupta, Sachin
    2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [24] A hybrid pattern based text mining approach for malware detection using DBScan
    Aashima Malhotra
    Karan Bajaj
    CSI Transactions on ICT, 2016, 4 (2-4) : 141 - 149
  • [25] Malicious Traffic Detection in IoT and Local Networks Using Stacked Ensemble Classifier
    Indrasiri, R. D. Pubudu L.
    Lee, Ernesto
    Rupapara, Vaibhav
    Rustam, Furqan
    Ashraf, Imran
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (01): : 489 - 515
  • [26] Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features
    Ferrante, Alberto
    Medvet, Eric
    Mercaldo, Francesco
    Milosevic, Jelena
    Visaggio, Corrado Aaron
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 372 - 381
  • [27] Visual-Based Fire Detection Using Local Binary Pattern-Three Orthogonal Planes
    Sthevanie, Febryanti
    Nugroho, Hertog
    Yulianto, Fazmah Arif
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND CYBERNETICS (CYBERNETICSCOM), 2013, : 155 - 159
  • [28] Detecting Malware in Malicious Virtual Machines Using Tensor Analysis Techniques
    Chang, Ting-Yao
    Lai, Wei-Yu
    Hsiang, Tien-Ruey
    Mao, Ching-Hao
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 821 - 830
  • [29] A Malware Detection Approach Using Malware Images and Autoencoders
    Jin, Xiang
    Xing, Xiaofei
    Elahi, Haroon
    Wang, Guojun
    Jiang, Hai
    2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), 2020, : 1 - 6
  • [30] Malware Detection using Malware Image and Deep Learning
    Choi, Sunoh
    Jang, Sungwook
    Kim, Youngsoo
    Kim, Jonghyun
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 1193 - 1195