Cargando…

Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition

The most often reported danger to computer security is malware. Antivirus company AV-Test Institute reports that more than 5 million malware samples are created each day. A malware classification method is frequently required to prioritize these occurrences because security teams cannot address all...

Descripción completa

Detalles Bibliográficos
Autores principales: Naeem, Muhammad Rehan, Amin, Rashid, Alshamrani, Sultan S., Alshehri, Abdullah
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9050294/
https://www.ncbi.nlm.nih.gov/pubmed/35498213
http://dx.doi.org/10.1155/2022/6294058
_version_ 1784696330081271808
author Naeem, Muhammad Rehan
Amin, Rashid
Alshamrani, Sultan S.
Alshehri, Abdullah
author_facet Naeem, Muhammad Rehan
Amin, Rashid
Alshamrani, Sultan S.
Alshehri, Abdullah
author_sort Naeem, Muhammad Rehan
collection PubMed
description The most often reported danger to computer security is malware. Antivirus company AV-Test Institute reports that more than 5 million malware samples are created each day. A malware classification method is frequently required to prioritize these occurrences because security teams cannot address all of that malware at once. Malware's variety, volume, and sophistication are all growing at an alarming rate. Hackers and attackers routinely design systems that can automatically rearrange and encrypt their code to escape discovery. Traditional machine learning approaches, in which classifiers learn based on a hand-crafted feature vector, are ineffective for classifying malware. Recently, deep convolutional neural networks (CNNs) successfully identified and classified malware. To categorize malware, a smart system has been suggested in this research. A novel model of deep learning is introduced to categorize malware families and multiclassification. The malware file is converted to a grayscale picture, and the image is then classified using a convolutional neural network. To evaluate the performance of our technique, we used a Microsoft malware dataset of 10,000 samples with nine distinct classifications. The findings stood out among the deep learning models with 99.97% accuracy for nine malware types.
format Online
Article
Text
id pubmed-9050294
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-90502942022-04-29 Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition Naeem, Muhammad Rehan Amin, Rashid Alshamrani, Sultan S. Alshehri, Abdullah Comput Intell Neurosci Research Article The most often reported danger to computer security is malware. Antivirus company AV-Test Institute reports that more than 5 million malware samples are created each day. A malware classification method is frequently required to prioritize these occurrences because security teams cannot address all of that malware at once. Malware's variety, volume, and sophistication are all growing at an alarming rate. Hackers and attackers routinely design systems that can automatically rearrange and encrypt their code to escape discovery. Traditional machine learning approaches, in which classifiers learn based on a hand-crafted feature vector, are ineffective for classifying malware. Recently, deep convolutional neural networks (CNNs) successfully identified and classified malware. To categorize malware, a smart system has been suggested in this research. A novel model of deep learning is introduced to categorize malware families and multiclassification. The malware file is converted to a grayscale picture, and the image is then classified using a convolutional neural network. To evaluate the performance of our technique, we used a Microsoft malware dataset of 10,000 samples with nine distinct classifications. The findings stood out among the deep learning models with 99.97% accuracy for nine malware types. Hindawi 2022-04-21 /pmc/articles/PMC9050294/ /pubmed/35498213 http://dx.doi.org/10.1155/2022/6294058 Text en Copyright © 2022 Muhammad Rehan Naeem et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Naeem, Muhammad Rehan
Amin, Rashid
Alshamrani, Sultan S.
Alshehri, Abdullah
Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition
title Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition
title_full Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition
title_fullStr Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition
title_full_unstemmed Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition
title_short Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition
title_sort digital forensics for malware classification: an approach for binary code to pixel vector transition
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9050294/
https://www.ncbi.nlm.nih.gov/pubmed/35498213
http://dx.doi.org/10.1155/2022/6294058
work_keys_str_mv AT naeemmuhammadrehan digitalforensicsformalwareclassificationanapproachforbinarycodetopixelvectortransition
AT aminrashid digitalforensicsformalwareclassificationanapproachforbinarycodetopixelvectortransition
AT alshamranisultans digitalforensicsformalwareclassificationanapproachforbinarycodetopixelvectortransition
AT alshehriabdullah digitalforensicsformalwareclassificationanapproachforbinarycodetopixelvectortransition