当前位置: X-MOL 学术IET Inf. Secur. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Malware classification using compact image features and multiclass support vector machines
IET Information Security ( IF 1.4 ) Pub Date : 2020-06-22 , DOI: 10.1049/iet-ifs.2019.0189
Lahouari Ghouti 1 , Muhammad Imam 2
Affiliation  

Malware and malicious code do not only incur considerable costs and losses but impact negatively the reputation of the targeted organisations. Malware developers, hackers, and information security specialists are continuously improving their strategies to defeat each other. Unfortunately, there is no one-size-fits-all solution to detect and eradicate any malware. This situation is aggravated more by the undetected vulnerabilities that usually impair computer software and internet tools. Such vulnerabilities will remain undetected until fully exploited by malware developers, which will eventually cause considerable financial and reputation losses. In this paper, we propose a novel scheme to detect and classify malware using only image representations of the malware binaries. Highly discriminative features of the malware category and structure are extracted in a compact subspace using principal component analysis. Then, an optimised support vector machine model classifies the extracted features into malware categories. Unlike existing classification models, our solution requires simple algebraic dot products to classify malware based on representative digital images. To assess its performance, publicly-available image datasets, Malimg, Ember and BIG 2015, are considered. Our performance analysis indicates that their classifier outperforms state-of-the-art models and attains classification accuracies of 0.998, 0.911, and 0.997 using Malimg, Ember and BIG 2015 malware datasets, respectively.

中文翻译:

使用紧凑的图像功能和多类支持向量机对恶意软件进行分类

恶意软件和恶意代码不仅会造成可观的成本和损失,还会对目标组织的声誉造成负面影响。恶意软件开发人员,黑客和信息安全专家正在不断改进自己的策略,以相互击败。不幸的是,没有一种万能的解决方案可以检测和消除任何恶意软件。通常未损坏计算机软件和Internet工具的未检测到的漏洞使这种情况更加恶化。在被恶意软件开发人员完全利用之前,此类漏洞将一直未被发现,这最终将导致可观的财务和声誉损失。在本文中,我们提出了一种仅使用恶意软件二进制文件的图像表示来检测和分类恶意软件的新颖方案。使用主成分分析在紧凑的子空间中提取恶意软件类别和结构的高度区分性特征。然后,优化的支持向量机模型将提取的特征分类为恶意软件类别。与现有分类模型不同,我们的解决方案需要简单的代数点产品来根据代表性的数字图像对恶意软件进行分类。为了评估其性能,考虑了公开可用的图像数据集Malimg,Ember和BIG 2015。我们的性能分析表明,使用Malimg,Ember和BIG 2015恶意软件数据集,它们的分类器性能优于最新模型,并分别达到0.998、0.911和0.997的分类精度。优化的支持向量机模型将提取的功能分为恶意软件类别。与现有分类模型不同,我们的解决方案需要简单的代数点产品来根据代表性的数字图像对恶意软件进行分类。为了评估其性能,考虑了公开可用的图像数据集Malimg,Ember和BIG 2015。我们的性能分析表明,使用Malimg,Ember和BIG 2015恶意软件数据集,它们的分类器性能优于最新模型,并分别达到0.998、0.911和0.997的分类精度。优化的支持向量机模型将提取的功能分为恶意软件类别。与现有分类模型不同,我们的解决方案需要简单的代数点产品来根据代表性的数字图像对恶意软件进行分类。为了评估其性能,考虑了公开可用的图像数据集Malimg,Ember和BIG 2015。我们的性能分析表明,使用Malimg,Ember和BIG 2015恶意软件数据集,它们的分类器性能优于最新模型,并分别达到0.998、0.911和0.997的分类精度。考虑了Ember和BIG 2015。我们的性能分析表明,使用Malimg,Ember和BIG 2015恶意软件数据集,它们的分类器性能优于最新模型,并分别达到0.998、0.911和0.997的分类精度。考虑了Ember和BIG 2015。我们的性能分析表明,使用Malimg,Ember和BIG 2015恶意软件数据集,它们的分类器性能优于最新模型,并分别达到0.998、0.911和0.997的分类精度。
更新日期:2020-08-20
down
wechat
bug