AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (3.7 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Article | Open Access

Conglomerate Stratum Model for Categorization of Malware Family in Image Processing

Rupali Komatwar1( )Manesh Kokare2
Department of Computer Engineering, Government Polytechnic, Mumbai 400051, India
Department of Electronics and Telecommunication, Shri Guru Gobind Singhji Institute of Engineering and Technology, Nanded 431606, India
Show Author Information

Abstract

In recent years, there has been an enormous increase in the volume of malware generation and the classification of malware samples plays a crucial role in building and maintaining security. Hence, there is a need to explore new approaches to overcome the limitations of malware classification such as pre-combustion, peculiarity eradication, and categorization. To overcome these issues, this paper proposes a novel Conglomerate Stratum Model (CSM), which categorizes them into groups and identifies their respective families based on their behavior. Initially, the precombustion process used Triad Seeped Technique (TST) in which the image is first regularized by applying ripples. Secondly, we introduced a Quatrain Layer Method (QLM) to upgrade the robustness of malware image features in peculiarity eradication. Then the specific output of the quatrain layer is given to Acclimatized Patronage Scheme (APS) for categorization, and this process effectively classifies the malware types with greater accuracy. The results demonstrate that our model can achieve 99.41% accuracy in classifying malware samples. Also, the values of sensitivity, precision, negative predictive, and recall are higher than 0.9 with the false-negative rate of 0.04, and the false-positive rate 0.003 proving the model to be optimistic. The experimental comparison demonstrates its superior performance concerning state-of-the-art techniques.

References

[1]

X. Wang, C. Li, and D. Song, Crowdnet: Identifying large-scale malicious attacks over android kernel structures, IEEE Access, vol. 8, pp. 15823–15837, 2020.

[2]

T. Lu, Y. Du, L. Ouyang, Q. Chen, and X. Wang, Android malware detection based on a hybrid deep learning model, Secur. Commun. Netw., vol. 2020, pp. 1–11, 2020.

[3]

M. Alazab, M. Alazab, A. Shalaginov, A. Mesleh, and A. Awajan, Intelligent mobile malware detection using permission requests and API calls, Future Gener. Comput. Syst., vol. 107, pp. 509–521, 2020.

[4]
S. Tobiyama, Y. Yamaguchi, H. Shimada, T. Ikuse, and T. Yagi, Malware detection with deep neural network using process behavior, in Proc. 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), Atlanta, GA, USA, 2016, pp. 577–582.
[5]

H. Darabian, A. Dehghantanha, S. Hashemi, S. Homayoun, and K. K. R. Choo, An opcode-based technique for polymorphic Internet of Things malware detection, Concurr. Comput. Pract. Exp., vol. 32, no. 6, p. 5173, 2020.

[6]

R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran, and S. Venkatraman, Robust intelligent malware detection using deep learning, IEEE Access, vol. 7, pp. 46717–46738, 2019.

[7]
F. Abri, S. Siami-Namini, M. A. Khanghah, F. M. Soltani, and A. S. Namin, Can machine/deep learning classifiers detect zero-day malware with high accuracy? in Proc. 2019 IEEE Int. Conf. Big Data (Big Data), Los Angeles, CA, USA, 2020, pp. 3252–3259.
[8]
B. Bencsath, G. Ács Kurucz, L. Buttyan G. Molnar, G. Vaspori, and R. Kamaras, Duqu 2.0: A comparison to duqu, https://crysys.hu/publications/files/duqu2.pdf, 2015.
[9]

F. Xiao, Z. Lin, Y. Sun, and Y. Ma, Malware detection based on deep learning of behavior graphs, Math. Probl. Eng., vol. 2019, pp. 1–10, 2019.

[10]
H. Shi and J. Mirkovic, Hiding debuggers from malware with apate, in Proc. Symp. on Applied Computing, Marrakech, Morocco, 2017, pp. 1703–1710.
[11]

H. Darabian, S. Homayounoot, A. Dehghantanha, S. Hashemi, H. Karimipour, R. M. Parizi, and K. K R. Choo, Detecting cryptomining malware: A deep learning approach for static and dynamic analysis, J. Grid Comput., vol. 18, no. 2, pp. 293–303, 2020.

[12]
T. Shibahara, T. Yagi, M. Akiyama, D. Chiba, and T. Yada, Efficient dynamic malware analysis based on network behavior using deep learning, in Proc. 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 2017, pp. 1–7.
[13]

W. Han, J. Xue, Y. Wang, Z. Liu, and Z. Kong, MalInsight: A systematic profiling based malware detection framework, J. Netw. Comput. Appl., vol. 125, pp. 236–250, 2019.

[14]
Q. K. Ali Mirza, F. Hussain, I. Awan, M. Younas, and S. Sharieh, Taxonomy-based intelligent malware detection framework, in Proc. 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2020, pp. 1–6.
[15]

R. Komatwar and M. Kokare, Customized convolutional neural networks with K-nearest neighbor classification system for malware categorization, J. Appl. Secur. Res., vol. 16, no. 1, pp. 71–90, 2021.

[16]

A. Damodaran, F. D. Troia, C. A. Visaggio, T. H. Austin, and M. Stamp, A comparison of static, dynamic, and hybrid analysis for malware detection, J. Comput. Virol. Hacking Tech., vol. 13, no. 1, pp. 1–12, 2017.

[17]

A. Namavar Jahromi, S. Hashemi, A. Dehghantanha, K. K R. Choo, H. Karimipour, D. E. Newton, and R. M. Parizi, An improved two-hidden-layer extreme learning machine for malware hunting, Comput. Secur., vol. 89, p. 101655, 2020.

[18]
X. Liu, J. Zhang, Y. Lin, and H. Li, ATMPA: Attacking machine learning-based malware visualization detection methods via adversarial examples, in Proc. Int. Symp. on Quality of Service, Phoenix, AZ, USA, 2019, pp. 1–10.
[19]

A. Pastor, A. Mozo, S. Vakaruk, D. Canavese, D. R. López, L. Regano, S. Gómez-Canaval, and A. Lioy, Detection of encrypted cryptomining malware connections with machine and deep learning, IEEE Access, vol. 8, pp. 158036–158055, 2020.

[20]

M. Rhode, P. Burnap, and K. Jones, Early-stage malware prediction using recurrent neural networks, Comput. Secur., vol. 77, pp. 578–594, 2018.

[21]

M. Sargent, J. Kristoff, V. Paxson, and M. Allman, On the potential abuse of IGMP, SIGCOMM Comput. Commun. Rev., vol. 47, no. 1, pp. 27–35, 2017.

[23]
L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath, Malware images: Visualization and automatic classification, in Proc. 8th Int. Symp. on Visualization for Cyber Security, Pittsburgh, PA, USA, 2011, pp. 1–7.
[24]
A. F. Agarap, Towards building an intelligent anti-malware system: A deep learning approach using support vector machine (SVM) for malware classification, arXiv preprint arXiv: 1801.00318, 2017.
Fuzzy Information and Engineering
Pages 203-219
Cite this article:
Komatwar R, Kokare M. Conglomerate Stratum Model for Categorization of Malware Family in Image Processing. Fuzzy Information and Engineering, 2023, 15(3): 203-219. https://doi.org/10.26599/FIE.2023.9270016

655

Views

103

Downloads

0

Crossref

0

Web of Science

0

Scopus

Altmetrics

Received: 11 August 2020
Revised: 12 February 2021
Accepted: 30 May 2021
Published: 01 September 2023
© The Author(s) 2023. Published by Tsinghua University Press.

This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).

Return