Cargando…
Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition
The most often reported danger to computer security is malware. Antivirus company AV-Test Institute reports that more than 5 million malware samples are created each day. A malware classification method is frequently required to prioritize these occurrences because security teams cannot address all...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9050294/ https://www.ncbi.nlm.nih.gov/pubmed/35498213 http://dx.doi.org/10.1155/2022/6294058 |
_version_ | 1784696330081271808 |
---|---|
author | Naeem, Muhammad Rehan Amin, Rashid Alshamrani, Sultan S. Alshehri, Abdullah |
author_facet | Naeem, Muhammad Rehan Amin, Rashid Alshamrani, Sultan S. Alshehri, Abdullah |
author_sort | Naeem, Muhammad Rehan |
collection | PubMed |
description | The most often reported danger to computer security is malware. Antivirus company AV-Test Institute reports that more than 5 million malware samples are created each day. A malware classification method is frequently required to prioritize these occurrences because security teams cannot address all of that malware at once. Malware's variety, volume, and sophistication are all growing at an alarming rate. Hackers and attackers routinely design systems that can automatically rearrange and encrypt their code to escape discovery. Traditional machine learning approaches, in which classifiers learn based on a hand-crafted feature vector, are ineffective for classifying malware. Recently, deep convolutional neural networks (CNNs) successfully identified and classified malware. To categorize malware, a smart system has been suggested in this research. A novel model of deep learning is introduced to categorize malware families and multiclassification. The malware file is converted to a grayscale picture, and the image is then classified using a convolutional neural network. To evaluate the performance of our technique, we used a Microsoft malware dataset of 10,000 samples with nine distinct classifications. The findings stood out among the deep learning models with 99.97% accuracy for nine malware types. |
format | Online Article Text |
id | pubmed-9050294 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-90502942022-04-29 Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition Naeem, Muhammad Rehan Amin, Rashid Alshamrani, Sultan S. Alshehri, Abdullah Comput Intell Neurosci Research Article The most often reported danger to computer security is malware. Antivirus company AV-Test Institute reports that more than 5 million malware samples are created each day. A malware classification method is frequently required to prioritize these occurrences because security teams cannot address all of that malware at once. Malware's variety, volume, and sophistication are all growing at an alarming rate. Hackers and attackers routinely design systems that can automatically rearrange and encrypt their code to escape discovery. Traditional machine learning approaches, in which classifiers learn based on a hand-crafted feature vector, are ineffective for classifying malware. Recently, deep convolutional neural networks (CNNs) successfully identified and classified malware. To categorize malware, a smart system has been suggested in this research. A novel model of deep learning is introduced to categorize malware families and multiclassification. The malware file is converted to a grayscale picture, and the image is then classified using a convolutional neural network. To evaluate the performance of our technique, we used a Microsoft malware dataset of 10,000 samples with nine distinct classifications. The findings stood out among the deep learning models with 99.97% accuracy for nine malware types. Hindawi 2022-04-21 /pmc/articles/PMC9050294/ /pubmed/35498213 http://dx.doi.org/10.1155/2022/6294058 Text en Copyright © 2022 Muhammad Rehan Naeem et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Naeem, Muhammad Rehan Amin, Rashid Alshamrani, Sultan S. Alshehri, Abdullah Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition |
title | Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition |
title_full | Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition |
title_fullStr | Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition |
title_full_unstemmed | Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition |
title_short | Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition |
title_sort | digital forensics for malware classification: an approach for binary code to pixel vector transition |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9050294/ https://www.ncbi.nlm.nih.gov/pubmed/35498213 http://dx.doi.org/10.1155/2022/6294058 |
work_keys_str_mv | AT naeemmuhammadrehan digitalforensicsformalwareclassificationanapproachforbinarycodetopixelvectortransition AT aminrashid digitalforensicsformalwareclassificationanapproachforbinarycodetopixelvectortransition AT alshamranisultans digitalforensicsformalwareclassificationanapproachforbinarycodetopixelvectortransition AT alshehriabdullah digitalforensicsformalwareclassificationanapproachforbinarycodetopixelvectortransition |