Skip to main content

Enhancing Obfuscated Malware Detection with Machine Learning Techniques

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1688))

Abstract

Obfuscated malware is malware that tries to be hidden from malware detection software. While there are some advances in the malware detection research community in recent years, modern malware uses multiple techniques to avoid being detected by the anti-malware system. In this research, we aim to improve the detection quality of malware by using state-of-the-art machine learning algorithms. The experimental results show that our proposed methods outperform state-of-the-art research studies.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Aslan, Ö.A., Samet, R.: A comprehensive review on malware detection approaches. IEEE Access 8, 6249–6271 (2020)

    Article  Google Scholar 

  2. Bekerman, D., Shapira, B., Rokach, L., Bar, A.: Unknown malware detection using network traffic classification. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 134–142. IEEE (2015)

    Google Scholar 

  3. Carrier., T., Victor., P., Tekeoglu., A., Lashkari., A.: Detecting obfuscated malware using memory feature engineering. In: ICISSP, pp. 177–188. INSTICC, SciTePress (2022). https://doi.org/10.5220/0010908200003120

  4. Chen, T., Guestrin, C.: Xgboost: a scalable tree boosting system. In: KDD, pp. 785–794 (2016)

    Google Scholar 

  5. Dang, Q.-V.: Studying machine learning techniques for intrusion detection systems. In: Dang, T.K., Küng, J., Takizawa, M., Bui, S.H. (eds.) FDSE 2019. LNCS, vol. 11814, pp. 411–426. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-35653-8_28

    Chapter  Google Scholar 

  6. Dang, Q.-V.: Intrusion detection in software-defined networks. In: Dang, T.K., Küng, J., Chung, T.M., Takizawa, M. (eds.) FDSE 2021. LNCS, vol. 13076, pp. 356–371. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-91387-8_23

    Chapter  Google Scholar 

  7. Dang, Q.-V.: Studying the attack detection problem using the dataset CIDDS-001. In: Antipova, T. (ed.) DSIC 2021. LNNS, vol. 381, pp. 525–532. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-93677-8_46

    Chapter  Google Scholar 

  8. Das, S., Liu, Y., Zhang, W., Chandramohan, M.: Semantics-based online malware detection: towards efficient real-time protection against malware. IEEE Trans. Inf. Forensics Secur. 11(2), 289–302 (2015)

    Article  Google Scholar 

  9. Dhanya, K.A., Dheesha, O.K., Gireesh Kumar, T., Vinod, P.: Detection of obfuscated mobile malware with machine learning and deep learning models. In: Thampi, S.M., Piramuthu, S., Li, K.-C., Berretti, S., Wozniak, M., Singh, D. (eds.) SoMMA 2020. CCIS, vol. 1366, pp. 221–231. Springer, Singapore (2021). https://doi.org/10.1007/978-981-16-0419-5_18

    Chapter  Google Scholar 

  10. Dorogush, A.V., Ershov, V., Gulin, A.: Catboost: gradient boosting with categorical features support. arXiv preprint arXiv:1810.11363 (2018)

  11. Elhadi, A.A., Maarof, M.A., Osman, A.H.: Malware detection based on hybrid signature behaviour application programming interface call graph. Am. J. Appl. Sci. 9(3), 283 (2012)

    Article  Google Scholar 

  12. FortiGuard Labs: global threat landscape report (2022). https://visionayrlive.com/tp/ss_at/wat/0wfgigj72/report-q1-2022-threat-landscape.pdf

  13. Huidobro, C.B., Cordero, D., Cubillos, C., Cid, H.A., Barragán, C.C.: Obfuscation procedure based on the insertion of the dead code in the crypter by binary search. In: ICCCC, pp. 183–192. IEEE (2018)

    Google Scholar 

  14. Ke, G., et al.: LightGBM: a highly efficient gradient boosting decision tree. Advances in Neural Information Processing Systems 30 (NIPS 2017)

    Google Scholar 

  15. Ki, Y., Kim, E., Kim, H.K.: A novel approach to detect malware based on API call sequence analysis. Int. J. Distrib. Sens. Netw. 11(6), 659101 (2015)

    Article  Google Scholar 

  16. Kouliaridis, V., Kambourakis, G.: A comprehensive survey on machine learning techniques for android malware detection. Information 12(5), 185 (2021)

    Article  Google Scholar 

  17. Nath, H.V., Mehtre, B.M.: Static malware analysis using machine learning methods. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol. 420, pp. 440–450. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54525-2_39

    Chapter  Google Scholar 

  18. Sahay, S.K., Sharma, A., Rathore, H.: Evolution of malware and its detection techniques. In: Tuba, M., Akashe, S., Joshi, A. (eds.) Information and Communication Technology for Sustainable Development. AISC, vol. 933, pp. 139–150. Springer, Singapore (2020). https://doi.org/10.1007/978-981-13-7166-0_14

    Chapter  Google Scholar 

  19. Sai, K.N., Thanudas, B., Sreelal, S., Chakraborty, A., Manoj, B.: MACA-I: a malware detection technique using memory management API call mining. In: TENCON 2019, IEEE Region 10 Conference (TENCON), pp. 527–532. IEEE (2019)

    Google Scholar 

  20. Sihwail, R., Omar, K., Ariffin, K.Z.: A survey on malware analysis techniques: static, dynamic, hybrid and memory analysis. Int. J. Adv. Sci. Eng. Inf. Technol. 8(4–2), 1662–1671 (2018)

    Google Scholar 

  21. Sikorski, M., Honig, A.: Practical malware analysis: the hands-on guide to dissecting malicious software. No Starch Press (2012)

    Google Scholar 

  22. You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 297–300. IEEE (2010)

    Google Scholar 

  23. Zhang, X., Breitinger, F., Luechinger, E., O’Shaughnessy, S.: Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations. Forensic Sci. Int. Digit. Investig. 39, 301285 (2021)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quang-Vinh Dang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dang, QV. (2022). Enhancing Obfuscated Malware Detection with Machine Learning Techniques. In: Dang, T.K., Küng, J., Chung, T.M. (eds) Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications. FDSE 2022. Communications in Computer and Information Science, vol 1688. Springer, Singapore. https://doi.org/10.1007/978-981-19-8069-5_54

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-8069-5_54

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-8068-8

  • Online ISBN: 978-981-19-8069-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics