Collection of Selected Papers of the III International Conference on Information Technology and Nanotechnology 2017
DOI: 10.18287/1613-0073-2017-1901-132-139
|View full text |Cite
|
Sign up to set email alerts
|

Heuristic Malware Detection Mechanism Based on Executable Files Static Analysis

Abstract: To ensure the protection of information processed by computer systems is currently the most important task in the construction and operation of the automated systems. The paper presents the application justification of a new set of features distinguished at the stage of the static analysis of the executable files to address the problem of malicious code detection. In the course of study, following problems were solved: development of the executable files classifier in the absence of a priori data concerning th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Since malware detection is typically a classification task, various classical ML-based classifiers have been employed, such as logistic regression [135], SVMs [136], [137], knearest neighbors (k-NNs) [138], [139], decision trees [140], RFs [141], Naïve Bayes classifiers [142]. They operate in various feature spaces, containing either static features, such as strings (e.g., filenames, code fragments), N-grams, API calls, entropy, malware representation as a gray scale image, function call graphs (FCGs), CFGs, or dynamic ones: values of the memory contents at runtime, dynamic instruction traces (sequences of processor instructions called during the execution of a program), OpCodes [143], network traffic parameters or API call traces [16].…”
Section: A Shallow Machine Learning Algorithmsmentioning
confidence: 99%
“…Since malware detection is typically a classification task, various classical ML-based classifiers have been employed, such as logistic regression [135], SVMs [136], [137], knearest neighbors (k-NNs) [138], [139], decision trees [140], RFs [141], Naïve Bayes classifiers [142]. They operate in various feature spaces, containing either static features, such as strings (e.g., filenames, code fragments), N-grams, API calls, entropy, malware representation as a gray scale image, function call graphs (FCGs), CFGs, or dynamic ones: values of the memory contents at runtime, dynamic instruction traces (sequences of processor instructions called during the execution of a program), OpCodes [143], network traffic parameters or API call traces [16].…”
Section: A Shallow Machine Learning Algorithmsmentioning
confidence: 99%
“…Combining these static and dynamic features to detect malicious software can achieve higher performance [24]. Models used for training include logistic regression [25], SVM [26], k-nearest neighbor (k-NN) [27], decision tree [28], random forest [29], and so on. The newest research on the machine learning-based malware detection focus on innovative feature spaces.…”
Section: Shallow Machine Learning Based Malware Detection Approachesmentioning
confidence: 99%