An Opcode-Based Malware Detection Model Using Supervised Learning Algorithms

被引:0
|
作者
Samantray, Om Prakash [1 ]
Tripathy, Satya Narayan [2 ]
机构
[1] Raghu Inst Technol, Visakhapatnam, Andhra Pradesh, India
[2] Berhampur Univ, Brahmapur, India
关键词
Feature Extraction; Feature Selection; Machine Learning; Malicious Code; MalwareAnalysis; Malware Detection; Operation Code; Random Forest; Static Analysis;
D O I
10.4018/IJISP.2021100102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
There are several malware detection techniques available that are based on a signature-based approach. This approach can detect known malware very effectively but sometimes may fail to detect unknown or zero-day attacks. In this article, the authors have proposed a malware detection model that uses operation codes of malicious and benign executables as the feature. The proposed model uses opcode extract and count (OPEC) algorithm to prepare the opcode feature vector for the experiment. Most relevant features are selected using extra tree classifier feature selection technique and then passed through several supervised learning algorithms like support vector machine, naive bayes, decision tree, random forest, logistic regression, and k-nearest neighbour to build classification models for malware detection. The proposed model has achieved a detection accuracy of 98.7%, which makes this model better than many of the similar works discussed in the literature.
引用
收藏
页码:18 / 30
页数:13
相关论文
共 50 条
  • [41] Detection of Zero-day Malware Based on the Analysis of Opcode Sequences
    Zolotukhin, Mikhail
    Hamalainen, Timo
    2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
  • [42] Deep Neural Network Based on Android Mobile Malware Detection System Using Opcode Sequences
    Zhao, Lichao
    Li, Dan
    Zheng, Guangcong
    Shi, Wenbo
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 1141 - 1147
  • [43] Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features
    Zhang, Jixin
    Qin, Zheng
    Zhang, Kehuan
    Yin, Hui
    Zou, Jingfu
    IEEE ACCESS, 2018, 6 : 51964 - 51974
  • [44] A Survey on Android Malware Detection Techniques Using Supervised Machine Learning
    Altaha, Safa J.
    Aljughaiman, Ahmed
    Gul, Sonia
    IEEE ACCESS, 2024, 12 : 173168 - 173191
  • [45] Opcode-level function call graph based android malware classification using deep learning
    Niu, Weina
    Cao, Rong
    Zhang, Xiaosong
    Ding, Kangyi
    Zhang, Kaimeng
    Li, Ting
    Sensors (Switzerland), 2020, 20 (13): : 1 - 23
  • [46] OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
    Niu, Weina
    Cao, Rong
    Zhang, Xiaosong
    Ding, Kangyi
    Zhang, Kaimeng
    Li, Ting
    SENSORS, 2020, 20 (13) : 1 - 23
  • [47] Malware Variants Detection Based on Opcode Image Recognition in Small Training Set
    Wang, Tingting
    Xu, Ning
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 328 - 332
  • [48] Using opcode sequences in single-class learning to detect unknown malware
    Santos, I.
    Brezo, F.
    Sanz, B.
    Laorden, C.
    Bringas, P. G.
    IET INFORMATION SECURITY, 2011, 5 (04) : 220 - 227
  • [49] Machine Learning Framework to Analyze IoT Malware Using ELF and Opcode Features
    Tien, Chin-Wei
    Chen, Shang-Wen
    Ban, Tao
    Kuo, Sy-Yen
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2020, 1 (01):
  • [50] CogramDroid-An approach towards malware detection in Android using opcode ngrams
    Bhat, Parnika
    Dutta, Kamlesh
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (20):