Robust Malware Family Classification Using Effective Features and Classifiers

Malware development has significantly increased recently, posing a serious security risk to both consumers and businesses. Malware developers continually find new ways to circumvent security research�s ongoing efforts to guard against malware attacks. Malware Classification (MC) entails labeling a c...

Full description

Saved in:
Bibliographic Details
Main Authors: Hammad B.T., Jamil N., Ahmed I.T., Zain Z.M., Basheer S.
Other Authors: 57193327622
Format: Article
Published: MDPI 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-26800
record_format dspace
spelling my.uniten.dspace-268002023-05-29T17:36:48Z Robust Malware Family Classification Using Effective Features and Classifiers Hammad B.T. Jamil N. Ahmed I.T. Zain Z.M. Basheer S. 57193327622 36682671900 57193324906 36900229100 57207113102 Malware development has significantly increased recently, posing a serious security risk to both consumers and businesses. Malware developers continually find new ways to circumvent security research�s ongoing efforts to guard against malware attacks. Malware Classification (MC) entails labeling a class of malware to a specific sample, while malware detection merely entails finding malware without identifying which kind of malware it is. There are two main reasons why the most popular MC techniques have a low classification rate. First, Finding and developing accurate features requires highly specialized domain expertise. Second, a data imbalance that makes it challenging to classify and correctly identify malware. Furthermore, the proposed malware classification (MC) method consists of the following five steps: (i) Dataset preparation: 2D malware images are created from the malware binary files; (ii) Visualized Malware Pre-processing: the visual malware images need to be scaled to fit the CNN model�s input size; (iii) Feature extraction: both hand-engineering (Tamura) and deep learning (GoogLeNet) techniques are used to extract the features in this step; (iv) Classification: to perform malware classification, we employed k-Nearest Neighbor (KNN), Support Vector Machines (SVM), and Extreme Learning Machine (ELM). The proposed method is tested on a standard Malimg unbalanced dataset. The accuracy rate of the proposed method was extremely high, making it the most efficient option available. The proposed method�s accuracy rate was outperformed both the Hand-crafted feature and Deep Feature techniques, at 95.42 and 96.84 percent. � 2022 by the authors. Final 2023-05-29T09:36:48Z 2023-05-29T09:36:48Z 2022 Article 10.3390/app12157877 2-s2.0-85136983491 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85136983491&doi=10.3390%2fapp12157877&partnerID=40&md5=277f2d2c809d1e89203c985d4a17c97e https://irepository.uniten.edu.my/handle/123456789/26800 12 15 7877 All Open Access, Gold MDPI Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Malware development has significantly increased recently, posing a serious security risk to both consumers and businesses. Malware developers continually find new ways to circumvent security research�s ongoing efforts to guard against malware attacks. Malware Classification (MC) entails labeling a class of malware to a specific sample, while malware detection merely entails finding malware without identifying which kind of malware it is. There are two main reasons why the most popular MC techniques have a low classification rate. First, Finding and developing accurate features requires highly specialized domain expertise. Second, a data imbalance that makes it challenging to classify and correctly identify malware. Furthermore, the proposed malware classification (MC) method consists of the following five steps: (i) Dataset preparation: 2D malware images are created from the malware binary files; (ii) Visualized Malware Pre-processing: the visual malware images need to be scaled to fit the CNN model�s input size; (iii) Feature extraction: both hand-engineering (Tamura) and deep learning (GoogLeNet) techniques are used to extract the features in this step; (iv) Classification: to perform malware classification, we employed k-Nearest Neighbor (KNN), Support Vector Machines (SVM), and Extreme Learning Machine (ELM). The proposed method is tested on a standard Malimg unbalanced dataset. The accuracy rate of the proposed method was extremely high, making it the most efficient option available. The proposed method�s accuracy rate was outperformed both the Hand-crafted feature and Deep Feature techniques, at 95.42 and 96.84 percent. � 2022 by the authors.
author2 57193327622
author_facet 57193327622
Hammad B.T.
Jamil N.
Ahmed I.T.
Zain Z.M.
Basheer S.
format Article
author Hammad B.T.
Jamil N.
Ahmed I.T.
Zain Z.M.
Basheer S.
spellingShingle Hammad B.T.
Jamil N.
Ahmed I.T.
Zain Z.M.
Basheer S.
Robust Malware Family Classification Using Effective Features and Classifiers
author_sort Hammad B.T.
title Robust Malware Family Classification Using Effective Features and Classifiers
title_short Robust Malware Family Classification Using Effective Features and Classifiers
title_full Robust Malware Family Classification Using Effective Features and Classifiers
title_fullStr Robust Malware Family Classification Using Effective Features and Classifiers
title_full_unstemmed Robust Malware Family Classification Using Effective Features and Classifiers
title_sort robust malware family classification using effective features and classifiers
publisher MDPI
publishDate 2023
_version_ 1806427590377865216
score 13.214268