PE File-Based Malware Detection Using Machine Learning

In current times, malware writers write more progressive sophisticatedly designed malware in order to target the user. Therefore, one of the most cumbersome tasks for the cyber industry is to deal with this ever-increasing number of progressive malware. Traditional security solutions such as anti-viruses and anti-malware fail to detect these advanced types of malware because the majority of this malware are refined versions of their predecessor. Moreover, these solutions consume lots of computational resources on the host to accomplish their operations. Further, malware evades these security solutions by using intelligent approaches such as code encryption, obfuscation and polymorphism. Therefore, to provide alternatives to these solutions, this paper discusses the existing malware analysis and detection techniques in a comprehensive/holistic manner.

[1]  B. K. Tripathy,et al.  A Novel Malware Analysis Framework for Malware Detection and Classification using Machine Learning Approach , 2018, ICDCN.

[2]  Curtis B. Storlie,et al.  Graph-based malware detection using dynamic analysis , 2011, Journal in Computer Virology.

[3]  Moritz Contag,et al.  Syntia: Synthesizing the Semantics of Obfuscated Code , 2017, USENIX Security Symposium.

[4]  Irfan-Ullah Awan,et al.  CloudIntell: An intelligent malware detection system , 2017, Future Gener. Comput. Syst..

[5]  Yanfang Ye,et al.  ISMCS: An intelligent instruction sequence based malware categorization system , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.

[6]  Jules Pagna Disso,et al.  Similarity hash based scoring of portable executable files for efficient malware detection in IoT , 2020, Future Gener. Comput. Syst..

[7]  Guanghui Liang,et al.  A Behavior-Based Malware Variant Classification Technique , 2016 .

[8]  Rahil Hosseini,et al.  A state-of-the-art survey of malware detection approaches using data mining techniques , 2018, Human-centric Computing and Information Sciences.

[9]  Roberto Perdisci,et al.  MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing , 2016, AsiaCCS.

[10]  Edward Raff,et al.  An Alternative to NCD for Large Sequences, Lempel-Ziv Jaccard Distance , 2017, KDD.

[11]  Mahmood Fazlali,et al.  Heuristic metamorphic malware detection based on statistics of assembly instructions using classification algorithms , 2015, 2015 18th CSI International Symposium on Computer Architecture and Digital Systems (CADS).

[12]  Sattar Hashemi,et al.  HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection , 2013, Journal of Computer Virology and Hacking Techniques.

[13]  Christopher Krügel,et al.  A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.

[14]  Arun Lakhotia,et al.  Malware and Machine Learning , 2015, Intelligent Methods for Cyber Warfare.

[15]  Michalis Polychronakis,et al.  Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[16]  Christopher Krügel,et al.  Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[17]  Stefano Zanero,et al.  Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries , 2015, DIMVA.

[18]  Roberto Baldoni,et al.  Survey on the Usage of Machine Learning Techniques for Malware Analysis , 2017, Comput. Secur..

[19]  Salvatore J. Stolfo,et al.  Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[20]  Mark Stamp,et al.  A comparison of static, dynamic, and hybrid analysis for malware detection , 2015, Journal of Computer Virology and Hacking Techniques.

[21]  S. Sitharama Iyengar,et al.  A Survey on Malware Detection Using Data Mining Techniques , 2017, ACM Comput. Surv..

[22]  Sakir Sezer,et al.  Dynamic Analysis of Malware using Run Time Opcodes , 2017 .

[23]  Kang G. Shin,et al.  MutantX-S: Scalable Malware Clustering Based on Static Features , 2013, USENIX Annual Technical Conference.

[24]  Kieran McLaughlin,et al.  SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection , 2013, IEEE Transactions on Information Forensics and Security.

[25]  Divya Bansal,et al.  Zero-day malware detection , 2016, 2016 Sixth International Symposium on Embedded Computing and System Design (ISED).

[26]  Ilia Nouretdinov,et al.  Transcend: Detecting Concept Drift in Malware Classification Models , 2017, USENIX Security Symposium.