2016
DOI: 10.14429/dsj.66.9701
|View full text |Cite
|
Sign up to set email alerts
|

Control Flow Graph Based Multiclass Malware Detection Using Bi-normal Separation

Abstract: Control flow graphs (CFG) and OpCodes extracted from disassembled executable files are widely used for malware detection. Most of the research in static analysis is focused on binary class malware detection which only classifies an executable as benign or malware. To overcome this issue, CFG based multiclass malware detection system that automatically classifies the malware into their respective families is proposed. The use Bi-normal separation (BNS) as a feature scoring metric. Experimental results show that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 7 publications
0
14
0
Order By: Relevance
“…e DREBIN [22] method proposed by Arp et al uses a linear support vector machine (SVM) to analyze high-dimensional binary features. Kapoor and Dhavale [23] used opcodes combined with control flow graphs generated by extracting source code to perform malware classification. Nataraj and Manjunath [24] cleverly used another method to detect malware by converting binary files into grayscale images.…”
Section: Related Workmentioning
confidence: 99%
“…e DREBIN [22] method proposed by Arp et al uses a linear support vector machine (SVM) to analyze high-dimensional binary features. Kapoor and Dhavale [23] used opcodes combined with control flow graphs generated by extracting source code to perform malware classification. Nataraj and Manjunath [24] cleverly used another method to detect malware by converting binary files into grayscale images.…”
Section: Related Workmentioning
confidence: 99%
“…Arp et al [24] used multiple vector combinations based on semantics and syntax to detect malware for Android and document files. Kapoor and Dhavale [25] disassemble executable files and generate control flow graphs, then extract features from n-grams and extract features grading, and finally used information gain to feature dimensionality reduction and using machine learning algorithms to detect malware. Nguyen et al [26] proposed an enhanced form of control flow graph, and converted the control flow graph into an image, then used deep learning to detect malware.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In conjunction with formal methods, these approaches achieve excellent accuracy, but the analysis is timeconsuming and requires domain-level expertise for the temporal logic formulae generation [7]. Instead, most machine learning approaches are adaptive, generally more efficient, and rely on static analysis features included in the graphs, such as opcodes frequencies [8] and control/data dependencies [9] In this paper, we propose a malware family classification method based solely on the CG topology. This way, it is possible to show that the approach is intrinsically robust to intra-procedural obfuscation techniques.…”
Section: Introductionmentioning
confidence: 99%