2020
DOI: 10.1155/2020/6804290
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Malware Classification Method Based on Crucial Behavior

Abstract: Recently, some graph-based methods have been proposed for malware detection. However, current malware is generally characterized by sophisticated behaviors, which makes graph-based malware detection extremely challenging. To address this issue, we propose a graph repartition algorithm by transforming API call graphs into fragment behaviors based on programs’ dynamic execution traces. The proposed algorithm relies on the N-order subgraph (NSG) for constructing the appropriate fragment behavior. Moreover, we imp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…Moreover, to mitigate the shortcomings of the above-mentioned feature representation techniques, several studies such as Belaoued et al (2019) and Ali et al (2020) selected the most important features based on the weights that were calculated using the traditional TF-IDF technique, while ( Li et al, 2020a ) used TF-IDF technique to select and represent the proposed feature set. Other studies ( Xue et al, 2019 ; Xiao et al, 2020 ; Al-Rimy et al, 2020 ; Qin, Zhang & Chen, 2021 ) developed the traditional TF-IDF to propose enhanced TF-IDF techniques by which the obtained features were represented using more accurate weights. Xue et al (2019) proposed a malware classification model that connected a convolutional neural network (CNN) trained on static features and the random forest (RF) trained on dynamic features via a probability scoring threshold.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, to mitigate the shortcomings of the above-mentioned feature representation techniques, several studies such as Belaoued et al (2019) and Ali et al (2020) selected the most important features based on the weights that were calculated using the traditional TF-IDF technique, while ( Li et al, 2020a ) used TF-IDF technique to select and represent the proposed feature set. Other studies ( Xue et al, 2019 ; Xiao et al, 2020 ; Al-Rimy et al, 2020 ; Qin, Zhang & Chen, 2021 ) developed the traditional TF-IDF to propose enhanced TF-IDF techniques by which the obtained features were represented using more accurate weights. Xue et al (2019) proposed a malware classification model that connected a convolutional neural network (CNN) trained on static features and the random forest (RF) trained on dynamic features via a probability scoring threshold.…”
Section: Related Workmentioning
confidence: 99%
“…A well-known TF-IDF technique is imported from the information retrieval field and used for representation purposes by several malware detection researchers ( Zhang et al, 2019 ; Ali et al, 2020 ; Li et al, 2020a ; Li et al, 2020b ) to represent the extracted features in the form of weight-based vectors. Furthermore, several studies ( Wang & Zhang, 2013 ; Xue et al, 2019 ; Xiao et al, 2020 ; Al-Rimy et al, 2020 ; Qin, Zhang & Chen, 2021 ) have been carried out to develop various feature representation techniques by enhancing the concept of the traditional TF-IDF technique and boost its capability to accurately represent the extracted feature. However, the primary principle of these techniques has been built based on the main concept of the traditional TF-IDF technique, by which the probability distributions of the features in each class are not considered when the IDF is calculated.…”
Section: Introductionmentioning
confidence: 99%
“…It is challenging to address all types of threats with the same strategy because each type needs its defense strategy like antivirus, firewalls, algorithms, etc. ( Xiao et al, 2020 ). It is a severe problem for e-commerce ( Kim et al, 2018 ).…”
Section: Literature Reviewmentioning
confidence: 99%
“…The number of attacks through malware is a serious threat to e-commerce as the number of attacks is increasing yearly by a significant proportion. There were 670,000,000 malware variants in 2017, almost double the number in 2016 ( Xiao et al, 2020 ).…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [8], the confused malware is detected by proper hook installation and real calculation of malware activity time in user and kernel. In [9], a graph repartitioning algorithm that uses the N-order subgraph (NSG) to convert API call graphs into fragment behaviors is proposed for malware detection and family classification. Besides, the "term frequency-inverse document frequency" (TF-IDF) and information gain (IG) were improved and used to extract thecrucial N-order subgraph (CNSG).…”
Section: Introductionmentioning
confidence: 99%