Performance comparison of visualization-based malware detection and classification techniques

Convolutional neural networks; Deep learning; Learning systems; Malware; Multilayer neural networks; Support vector machines; Visualization; Analysis techniques; Deep learning; Dynamics analysis; Histogram of oriented gradients; Machine-learning; Malware analysis; Malware classifications; Malware de...

Full description

Saved in:
Bibliographic Details
Main Authors: Shah S.S.H., Jamil N., Khan A.U.R.
Other Authors: 57878344500
Format: Conference Paper
Published: Institute of Electrical and Electronics Engineers Inc. 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-27028
record_format dspace
spelling my.uniten.dspace-270282023-05-29T17:38:50Z Performance comparison of visualization-based malware detection and classification techniques Shah S.S.H. Jamil N. Khan A.U.R. 57878344500 36682671900 55602487700 Convolutional neural networks; Deep learning; Learning systems; Malware; Multilayer neural networks; Support vector machines; Visualization; Analysis techniques; Deep learning; Dynamics analysis; Histogram of oriented gradients; Machine-learning; Malware analysis; Malware classifications; Malware detection; Malwares; Memory analysis; Static analysis Cybercriminals use malware or malicious software to cause harm to the victim. Malware is a continuous source of concern for security teams. Malware analysis techniques, including static, dynamic, hybrid, and memory analysis, are used to comprehend the behavior and its impact. The aforementioned malware analysis techniques require domain knowledge to extract the artifacts from suspicious files, which is not always possible. A visualization approach, in which malware files are transformed into images, is one of the recently used techniques by researchers for malware detection and classification. In this paper, we apply four widely used techniques based on the visualization using a new dataset of memory dump files of malware families and benign classes. These visualization techniques include a histogram of oriented gradients (HOG) with multilayer perceptron (MLP), convolutional neural network (CNN) with pretrained weight of visual geometry group 16 (VGG), Transfer learning of VGG16 with support vector machine (SVM), and integration of global image descriptor (GIST) and HOG with SVM. Among the selected techniques, CNN with a pretrained weight of VGG16 outperformed the other techniques in terms of accuracy, precision, recall, and f1-score. Apart from the performance metrics, the results of selected techniques are also analyzed in terms of computational cost and memory utilization. � 2022 IEEE. Final 2023-05-29T09:38:50Z 2023-05-29T09:38:50Z 2022 Conference Paper 10.1109/ICET56601.2022.10004652 2-s2.0-85146882806 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85146882806&doi=10.1109%2fICET56601.2022.10004652&partnerID=40&md5=4c170f022d204d258252f539319ec996 https://irepository.uniten.edu.my/handle/123456789/27028 200 205 Institute of Electrical and Electronics Engineers Inc. Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Convolutional neural networks; Deep learning; Learning systems; Malware; Multilayer neural networks; Support vector machines; Visualization; Analysis techniques; Deep learning; Dynamics analysis; Histogram of oriented gradients; Machine-learning; Malware analysis; Malware classifications; Malware detection; Malwares; Memory analysis; Static analysis
author2 57878344500
author_facet 57878344500
Shah S.S.H.
Jamil N.
Khan A.U.R.
format Conference Paper
author Shah S.S.H.
Jamil N.
Khan A.U.R.
spellingShingle Shah S.S.H.
Jamil N.
Khan A.U.R.
Performance comparison of visualization-based malware detection and classification techniques
author_sort Shah S.S.H.
title Performance comparison of visualization-based malware detection and classification techniques
title_short Performance comparison of visualization-based malware detection and classification techniques
title_full Performance comparison of visualization-based malware detection and classification techniques
title_fullStr Performance comparison of visualization-based malware detection and classification techniques
title_full_unstemmed Performance comparison of visualization-based malware detection and classification techniques
title_sort performance comparison of visualization-based malware detection and classification techniques
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2023
_version_ 1806427897904234496
score 13.214268