A Survey of Malware Analysis Using Community Detection Algorithms

被引:5
|
作者
Amira, Abdelouahab [1 ,2 ]
Derhab, Abdelouahid [3 ]
Karbab, Elmouatez Billah [4 ]
Nouali, Omar [1 ]
机构
[1] Res Ctr Sci & Tech Informat CERIST, Algiers 16000, Algeria
[2] Univ Bejaia, Fac Sci Exactes, Dept Informat, Bejaia 06000, Algeria
[3] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh 11451, Saudi Arabia
[4] Concordia Univ, Secur Res Ctr, Montreal, PQ, Canada
关键词
Malware analysis; community detection; cyber-threat infrastructure; feature selection; FEATURE-SELECTION; BOTNET DETECTION; INTRUSION; TRENDS;
D O I
10.1145/3610223
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, we have witnessed an overwhelming and fast proliferation of different types of malware targeting organizations and individuals, which considerably increased the time required to detect malware. The malware developers make this issue worse by spreading many variants of the same malware [13]. To deal with this issue, graph theory techniques, and particularly community detection algorithms, can be leveraged to achieve bulk detection of malware families and variants to identify malicious communities instead of focusing on the detection of an individual instance of malware, which could significantly reduce the detection time. In this article, we review the state-of-the-art malware analysis solutions that employ community detection algorithms and provide a taxonomy that classifies the solutions with respect to five facets: analysis task, community detection approach, target platform, analysis type, and source of features. We present the solutions with respect to the analysis task, which covers malware detection, malware classification, cyber-threat infrastructure detection, and feature selection. The findings of this survey indicate that there is still room for contributions to further improve the state of the art and address research gaps. Finally, we discuss the advantages and the limitations of the solutions, identify open issues, and provide future research directions.
引用
收藏
页数:29
相关论文
共 50 条
  • [11] Detecting android malware using deep learning algorithms: A survey
    Alzubaidi, Abdulaziz
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [12] Malware Analysis Using Classification and Clustering Algorithms
    Balaji, K. M.
    Subbulakshmi, T.
    INTERNATIONAL JOURNAL OF E-COLLABORATION, 2022, 18 (01)
  • [13] A Qualitative Survey on Community Detection Attack Algorithms
    Tekin, Leyla
    Bostanoglu, Belgin Ergenc
    SYMMETRY-BASEL, 2024, 16 (10):
  • [14] Recent trends on community detection algorithms: A survey
    Gupta, Sumit
    Singh, Dhirendra Pratap
    MODERN PHYSICS LETTERS B, 2020, 34 (35):
  • [15] Analysis of Community Detection Algorithms
    Krishna, Jaya R.
    Chaudhry, Yash
    Sharma, Devi Prasad
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 669 - 674
  • [16] A Survey on Malware Detection Using Data Mining Techniques
    Ye, Yanfang
    Li, Tao
    Adjeroh, Donald
    Iyengar, S. Sitharama
    ACM COMPUTING SURVEYS, 2017, 50 (03)
  • [17] Survey of Mobile Malware Analysis, Detection Techniques and Tool
    Gyamfi, Nana Kwame
    Owusu, Ebenezer
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1101 - 1106
  • [18] Malware Detection Vectors and Analysis Techniques: A Brief Survey
    Deka, Dipjyoti
    Sarma, Nityananda
    Panicker, Nithin J.
    2016 INTERNATIONAL CONFERENCE ON ACCESSIBILITY TO DIGITAL WORLD (ICADW), 2016, : 81 - 85
  • [19] Entropy analysis to classify unknown packing algorithms for malware detection
    Munkhbayar Bat-Erdene
    Hyundo Park
    Hongzhe Li
    Heejo Lee
    Mahn-Soo Choi
    International Journal of Information Security, 2017, 16 : 227 - 248
  • [20] Entropy analysis to classify unknown packing algorithms for malware detection
    Bat-Erdene, Munkhbayar
    Park, Hyundo
    Li, Hongzhe
    Lee, Heejo
    Choi, Mahn-Soo
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (03) : 227 - 248