loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Anantha Rao Chukka 1 and V. Susheela Devi 2

Affiliations: 1 Defence Research and Development Organisation, India ; 2 Indian Institute of Science, Bengaluru, Karnataka, 560012, India

Keyword(s): Malware Detection, Machine Learning Models, Malware Analysis, API Sequences, Opcode Sequences, Import Function, File Meta Information, Malware Operational Patterns, Portable Executable, Artificial Neural Network, Support Vector Machine, Random Forest, Naive Bayes, K-nearest Neighbour.

Abstract: In recent times malware attacks on government and private organizations are rising. These attacks are carried out to steal confidential information which leads to loss of privacy, intellectual property issues and loss of revenue. These attacks are sophisticated and described as Advanced Persistent Threats(APT). The payloads used in this type of attacks are polymorphic and metamorphic in nature and contains stealth and root-kit components. As a result the conventional defence mechanisms like rule-based and signature-based methods fail to detect these malware. So modern approaches rely on static and dynamic analysis to detect sophisticated malware. However this process generates huge log files. The domain expert needs to review these logs to classify whether the binary is malicious or benign which is tedious, time consuming and expensive. Our work uses machine learning models trained on the datasets, created using the analysis logs, to overcome these problems. In this paper a number of supervised machine learning models are presented to classify the binary as malicious or benign. In this work we have used automated malware analysis framework to collect run time behavioural artefacts. Static analysis mainly focuses on collecting binary meta information, import functions and opcode sequences. The dataset is created by collecting malware from online sources and benign files from windows operating system and third party software. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.91.11.30

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Chukka, A. and Devi, V. (2021). Detection of Malicious Binaries by Applying Machine Learning Models on Static and Dynamic Artefacts. In Proceedings of the 6th International Conference on Internet of Things, Big Data and Security - IoTBDS; ISBN 978-989-758-504-3; ISSN 2184-4976, SciTePress, pages 29-37. DOI: 10.5220/0010379600290037

@conference{iotbds21,
author={Anantha Rao Chukka. and V. Susheela Devi.},
title={Detection of Malicious Binaries by Applying Machine Learning Models on Static and Dynamic Artefacts},
booktitle={Proceedings of the 6th International Conference on Internet of Things, Big Data and Security - IoTBDS},
year={2021},
pages={29-37},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010379600290037},
isbn={978-989-758-504-3},
issn={2184-4976},
}

TY - CONF

JO - Proceedings of the 6th International Conference on Internet of Things, Big Data and Security - IoTBDS
TI - Detection of Malicious Binaries by Applying Machine Learning Models on Static and Dynamic Artefacts
SN - 978-989-758-504-3
IS - 2184-4976
AU - Chukka, A.
AU - Devi, V.
PY - 2021
SP - 29
EP - 37
DO - 10.5220/0010379600290037
PB - SciTePress