Robust Malware Family Classification Using Effective Features and Classifiers
Malware development has significantly increased recently, posing a serious security risk to both consumers and businesses. Malware developers continually find new ways to circumvent security research�s ongoing efforts to guard against malware attacks. Malware Classification (MC) entails labeling a c...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Article |
Published: |
MDPI
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-26800 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-268002023-05-29T17:36:48Z Robust Malware Family Classification Using Effective Features and Classifiers Hammad B.T. Jamil N. Ahmed I.T. Zain Z.M. Basheer S. 57193327622 36682671900 57193324906 36900229100 57207113102 Malware development has significantly increased recently, posing a serious security risk to both consumers and businesses. Malware developers continually find new ways to circumvent security research�s ongoing efforts to guard against malware attacks. Malware Classification (MC) entails labeling a class of malware to a specific sample, while malware detection merely entails finding malware without identifying which kind of malware it is. There are two main reasons why the most popular MC techniques have a low classification rate. First, Finding and developing accurate features requires highly specialized domain expertise. Second, a data imbalance that makes it challenging to classify and correctly identify malware. Furthermore, the proposed malware classification (MC) method consists of the following five steps: (i) Dataset preparation: 2D malware images are created from the malware binary files; (ii) Visualized Malware Pre-processing: the visual malware images need to be scaled to fit the CNN model�s input size; (iii) Feature extraction: both hand-engineering (Tamura) and deep learning (GoogLeNet) techniques are used to extract the features in this step; (iv) Classification: to perform malware classification, we employed k-Nearest Neighbor (KNN), Support Vector Machines (SVM), and Extreme Learning Machine (ELM). The proposed method is tested on a standard Malimg unbalanced dataset. The accuracy rate of the proposed method was extremely high, making it the most efficient option available. The proposed method�s accuracy rate was outperformed both the Hand-crafted feature and Deep Feature techniques, at 95.42 and 96.84 percent. � 2022 by the authors. Final 2023-05-29T09:36:48Z 2023-05-29T09:36:48Z 2022 Article 10.3390/app12157877 2-s2.0-85136983491 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85136983491&doi=10.3390%2fapp12157877&partnerID=40&md5=277f2d2c809d1e89203c985d4a17c97e https://irepository.uniten.edu.my/handle/123456789/26800 12 15 7877 All Open Access, Gold MDPI Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
Malware development has significantly increased recently, posing a serious security risk to both consumers and businesses. Malware developers continually find new ways to circumvent security research�s ongoing efforts to guard against malware attacks. Malware Classification (MC) entails labeling a class of malware to a specific sample, while malware detection merely entails finding malware without identifying which kind of malware it is. There are two main reasons why the most popular MC techniques have a low classification rate. First, Finding and developing accurate features requires highly specialized domain expertise. Second, a data imbalance that makes it challenging to classify and correctly identify malware. Furthermore, the proposed malware classification (MC) method consists of the following five steps: (i) Dataset preparation: 2D malware images are created from the malware binary files; (ii) Visualized Malware Pre-processing: the visual malware images need to be scaled to fit the CNN model�s input size; (iii) Feature extraction: both hand-engineering (Tamura) and deep learning (GoogLeNet) techniques are used to extract the features in this step; (iv) Classification: to perform malware classification, we employed k-Nearest Neighbor (KNN), Support Vector Machines (SVM), and Extreme Learning Machine (ELM). The proposed method is tested on a standard Malimg unbalanced dataset. The accuracy rate of the proposed method was extremely high, making it the most efficient option available. The proposed method�s accuracy rate was outperformed both the Hand-crafted feature and Deep Feature techniques, at 95.42 and 96.84 percent. � 2022 by the authors. |
author2 |
57193327622 |
author_facet |
57193327622 Hammad B.T. Jamil N. Ahmed I.T. Zain Z.M. Basheer S. |
format |
Article |
author |
Hammad B.T. Jamil N. Ahmed I.T. Zain Z.M. Basheer S. |
spellingShingle |
Hammad B.T. Jamil N. Ahmed I.T. Zain Z.M. Basheer S. Robust Malware Family Classification Using Effective Features and Classifiers |
author_sort |
Hammad B.T. |
title |
Robust Malware Family Classification Using Effective Features and Classifiers |
title_short |
Robust Malware Family Classification Using Effective Features and Classifiers |
title_full |
Robust Malware Family Classification Using Effective Features and Classifiers |
title_fullStr |
Robust Malware Family Classification Using Effective Features and Classifiers |
title_full_unstemmed |
Robust Malware Family Classification Using Effective Features and Classifiers |
title_sort |
robust malware family classification using effective features and classifiers |
publisher |
MDPI |
publishDate |
2023 |
_version_ |
1806427590377865216 |
score |
13.214268 |