skip to main content
10.1145/3386723.3387839acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnissConference Proceedingsconference-collections
research-article

Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide

Authors Info & Claims
Published:18 May 2020Publication History

ABSTRACT

Malwares attacks are becoming increasingly destructive. Hackers target all types of devices from big to the most little ones. Researcher's communities in cybersecurity field are working hard to defend malwares attacks as well as any other malicious activity. In fact, the primary goal is to defend cyberattacks as fast as possible to avoid catastrophic damages. In this paper, we proposed new cybersecurity architecture specialized in malwares attacks defense. This proposal puts together four layers based on malwares behaviors. In addition, we perform malware classifier using malware visualization technique, GIST descriptor features and K-Nearest Neighbor algorithm. The classifier is able to put each input malware image into its corresponding family. Families distribution is been divided by malwares behaviors. For the purpose of attaining speedy malwares classifier, we use Univariate Feature Selection technique to reduce GIST feature. So we succeeded in getting from 320 to only 50 features in less timing with very close accuracy of 97,67%.

References

  1. Galal, H.S., Mahdy, Y.B. and Atiea, M.A. 2016. Behavior-based features model for malware detection. Journal of Computer Virology and Hacking Techniques. 12, 2 (May 2016), 59--67. DOI:https://doi.org/10.1007/s11416-015-0244-0.Google ScholarGoogle ScholarCross RefCross Ref
  2. Goshtasby, A.A. 2012. Image Descriptors. Image Registration. (2012), 219--246. DOI:https://doi.org/10.1007/978-1-4471-2458-0_5.Google ScholarGoogle Scholar
  3. Ikram, B.A.O., Mohammed, B., Abdelhakim, B.A., Lotfi, E.A. and Zafar, B. 2019. Machine Learning Application for Malwares Classification Using Visualization Technique. Proceedings of the 4th International Conference on Smart City Applications (Casablanca MA, 2019), 110:1-110:6.Google ScholarGoogle Scholar
  4. Luo, J. and Lo, D.C. 2017. Malware image classification using machine learning with local binary pattern. 2017 IEEE International Conference on Big Data (Big Data) (Dec. 2017), 4664--4667.Google ScholarGoogle ScholarCross RefCross Ref
  5. Makandar, A. and Patrot, A. 2015. Malware analysis and classification using Artificial Neural Network. 2015 International Conference on Trends in Automation, Communications and Computing Technology (I-TACT-15) (Dec. 2015), 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  6. Makandar, A. and Patrot, A. 2017. Wavelet Statistical Feature based Malware Class Recognition and Classification using Supervised Learning Classifier. Oriental journal of computer science and technology. 10, 2 (Jun. 2017), 400--406. DOI:https://doi.org/10.13005/ojcst/10.02.20.Google ScholarGoogle Scholar
  7. Nappa, A., Rafique, M.Z. and Caballero, J. 2014. The MALICIA dataset: identification and analysis of drive-by download operations. International Journal of Information Security. 14, (2014), 15--33. DOI:https://doi.org/10.1007/s10207-014-0248-7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Nataraj, L., Karthikeyan, S., Jacob, G. and Manjunath, B.S. 2011. Malware images: visualization and automatic classification. Proceedings of the 8th International Symposium on Visualization for Cyber Security - VizSec '11 (Pittsburgh, Pennsylvania, 2011), 1--7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Oliva, A. and Torralba, A. Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope. 31.Google ScholarGoogle Scholar
  10. Rieck, K., Holz, T., Willems, C., Düssel, P. and Laskov, P. 2008. Learning and Classification of Malware Behavior. Detection of Intrusions and Malware, and Vulnerability Assessment. D. Zamboni, ed. Springer Berlin Heidelberg. 108--125.Google ScholarGoogle Scholar
  11. Yajamanam, S., Selvin, V.R.S., Di Troia, F. and Stamp, M. 2018. Deep Learning versus Gist Descriptors for Image-based Malware Classification: Proceedings of the 4th International Conference on Information Systems Security and Privacy (Funchal, Madeira, Portugal, 2018), 553--561.Google ScholarGoogle Scholar

Index Terms

  1. Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        NISS '20: Proceedings of the 3rd International Conference on Networking, Information Systems & Security
        March 2020
        528 pages
        ISBN:9781450376341
        DOI:10.1145/3386723

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 May 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader