Performance comparison of visualization-based malware detection and classification techniques
Convolutional neural networks; Deep learning; Learning systems; Malware; Multilayer neural networks; Support vector machines; Visualization; Analysis techniques; Deep learning; Dynamics analysis; Histogram of oriented gradients; Machine-learning; Malware analysis; Malware classifications; Malware de...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Conference Paper |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-27028 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-270282023-05-29T17:38:50Z Performance comparison of visualization-based malware detection and classification techniques Shah S.S.H. Jamil N. Khan A.U.R. 57878344500 36682671900 55602487700 Convolutional neural networks; Deep learning; Learning systems; Malware; Multilayer neural networks; Support vector machines; Visualization; Analysis techniques; Deep learning; Dynamics analysis; Histogram of oriented gradients; Machine-learning; Malware analysis; Malware classifications; Malware detection; Malwares; Memory analysis; Static analysis Cybercriminals use malware or malicious software to cause harm to the victim. Malware is a continuous source of concern for security teams. Malware analysis techniques, including static, dynamic, hybrid, and memory analysis, are used to comprehend the behavior and its impact. The aforementioned malware analysis techniques require domain knowledge to extract the artifacts from suspicious files, which is not always possible. A visualization approach, in which malware files are transformed into images, is one of the recently used techniques by researchers for malware detection and classification. In this paper, we apply four widely used techniques based on the visualization using a new dataset of memory dump files of malware families and benign classes. These visualization techniques include a histogram of oriented gradients (HOG) with multilayer perceptron (MLP), convolutional neural network (CNN) with pretrained weight of visual geometry group 16 (VGG), Transfer learning of VGG16 with support vector machine (SVM), and integration of global image descriptor (GIST) and HOG with SVM. Among the selected techniques, CNN with a pretrained weight of VGG16 outperformed the other techniques in terms of accuracy, precision, recall, and f1-score. Apart from the performance metrics, the results of selected techniques are also analyzed in terms of computational cost and memory utilization. � 2022 IEEE. Final 2023-05-29T09:38:50Z 2023-05-29T09:38:50Z 2022 Conference Paper 10.1109/ICET56601.2022.10004652 2-s2.0-85146882806 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85146882806&doi=10.1109%2fICET56601.2022.10004652&partnerID=40&md5=4c170f022d204d258252f539319ec996 https://irepository.uniten.edu.my/handle/123456789/27028 200 205 Institute of Electrical and Electronics Engineers Inc. Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
Convolutional neural networks; Deep learning; Learning systems; Malware; Multilayer neural networks; Support vector machines; Visualization; Analysis techniques; Deep learning; Dynamics analysis; Histogram of oriented gradients; Machine-learning; Malware analysis; Malware classifications; Malware detection; Malwares; Memory analysis; Static analysis |
author2 |
57878344500 |
author_facet |
57878344500 Shah S.S.H. Jamil N. Khan A.U.R. |
format |
Conference Paper |
author |
Shah S.S.H. Jamil N. Khan A.U.R. |
spellingShingle |
Shah S.S.H. Jamil N. Khan A.U.R. Performance comparison of visualization-based malware detection and classification techniques |
author_sort |
Shah S.S.H. |
title |
Performance comparison of visualization-based malware detection and classification techniques |
title_short |
Performance comparison of visualization-based malware detection and classification techniques |
title_full |
Performance comparison of visualization-based malware detection and classification techniques |
title_fullStr |
Performance comparison of visualization-based malware detection and classification techniques |
title_full_unstemmed |
Performance comparison of visualization-based malware detection and classification techniques |
title_sort |
performance comparison of visualization-based malware detection and classification techniques |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
publishDate |
2023 |
_version_ |
1806427897904234496 |
score |
13.214268 |