A Survey of Malware Analysis Using Community Detection Algorithms

被引:5
|
作者
Amira, Abdelouahab [1 ,2 ]
Derhab, Abdelouahid [3 ]
Karbab, Elmouatez Billah [4 ]
Nouali, Omar [1 ]
机构
[1] Res Ctr Sci & Tech Informat CERIST, Algiers 16000, Algeria
[2] Univ Bejaia, Fac Sci Exactes, Dept Informat, Bejaia 06000, Algeria
[3] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh 11451, Saudi Arabia
[4] Concordia Univ, Secur Res Ctr, Montreal, PQ, Canada
关键词
Malware analysis; community detection; cyber-threat infrastructure; feature selection; FEATURE-SELECTION; BOTNET DETECTION; INTRUSION; TRENDS;
D O I
10.1145/3610223
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, we have witnessed an overwhelming and fast proliferation of different types of malware targeting organizations and individuals, which considerably increased the time required to detect malware. The malware developers make this issue worse by spreading many variants of the same malware [13]. To deal with this issue, graph theory techniques, and particularly community detection algorithms, can be leveraged to achieve bulk detection of malware families and variants to identify malicious communities instead of focusing on the detection of an individual instance of malware, which could significantly reduce the detection time. In this article, we review the state-of-the-art malware analysis solutions that employ community detection algorithms and provide a taxonomy that classifies the solutions with respect to five facets: analysis task, community detection approach, target platform, analysis type, and source of features. We present the solutions with respect to the analysis task, which covers malware detection, malware classification, cyber-threat infrastructure detection, and feature selection. The findings of this survey indicate that there is still room for contributions to further improve the state of the art and address research gaps. Finally, we discuss the advantages and the limitations of the solutions, identify open issues, and provide future research directions.
引用
收藏
页数:29
相关论文
共 50 条
  • [41] A Survey on Different Approaches for Malware Detection Using Machine Learning Techniques
    Rani, S. Soja
    Reeja, S. R.
    SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 389 - 398
  • [42] The proactivity of Perceptron derived algorithms in malware detection
    Mihai Cimpoeşu
    Dragos Gavriluţ
    Adrian Popescu
    Journal in Computer Virology, 2012, 8 (4): : 133 - 140
  • [43] Malware Detection and Classification with Machine Learning Algorithms
    Kumar, R. Vinoth
    Islam, Md Mojahidul
    Apon, Abir Hossain
    Prantha, C. S.
    SMART TRENDS IN COMPUTING AND COMMUNICATIONS, VOL 5, SMARTCOM 2024, 2024, 949 : 143 - 158
  • [44] A Survey on Android Malware Detection Techniques Using Supervised Machine Learning
    Altaha, Safa J.
    Aljughaiman, Ahmed
    Gul, Sonia
    IEEE ACCESS, 2024, 12 : 173168 - 173191
  • [45] Malware Analysis and Detection
    Rathore, Hemant
    Sewak, Mohit
    SECOND INTERNATIONAL CONFERENCE ON AIML SYSTEMS 2022, 2022,
  • [46] Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms
    Park, Seunghyun
    Choi, Jin-Young
    Journal of Advanced Transportation, 2020, 2020
  • [47] Malware Detection Method using Tree-based Machine Learning Algorithms
    Okada, Satoshi
    Matsuda, Wataru
    Fujimoto, Mariko
    Mitsunaga, Takuho
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING (ICOCO), 2021, : 103 - 108
  • [48] An Opcode-Based Malware Detection Model Using Supervised Learning Algorithms
    Samantray, Om Prakash
    Tripathy, Satya Narayan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (04) : 18 - 30
  • [49] Detection of Mirai Malware Attacks in IoT Environments Using Random Forest Algorithms
    Widiyasono, Nur
    Giriantari, Ida Ayu Dwi
    Sudarma, Made
    Linawati, L.
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2021, 10 (03): : 1209 - 1219
  • [50] Community Detection Using Parallel Genetic Algorithms
    Song, Yulong
    Li, Jianwu
    Zhang, Xiao
    Liu, Chunxue
    2012 IEEE FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), 2012, : 374 - 378