Classification of Malware Using Visualisation of Similarity Matrices

Sitalakshmi Venkatraman, Mamoun Alazab

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedingspeer-review

Abstract

Malicious software (malware) attacks are on the rise with the explosion of Internet of Things (IoT) worldwide. With the proliferation of Big Data, it becomes a time consuming process to use various automatic approaches and techniques that are available to detect and capture malware thoroughly. Visualisation techniques can support the malware analysis process for performing the similarity comparisons and summarisation of possible malware in such Big Data contexts. In this paper, we design a novel classification of malware using visualization of similarity matrices. The prime motivation of our proposal is to detect unknown malwares that undergo the innumerable obfuscations of extended x86 IA-32 (opcodes) in order to evade from traditional detection methods. Overall, the high accuracy of classification achieved with our proposed model can be observed visually due to significant dissimilarity of the behaviour patterns exhibited by malware opcodes as compared to benign opcodes.

Original languageEnglish
Title of host publicationProceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017
EditorsAmeer Al-Nemrat, Mamoun Alazab
Place of PublicationPiscataway, NJ
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages3-8
Number of pages6
Edition1
ISBN (Electronic)9781538621431
ISBN (Print)9781538621448
DOIs
Publication statusPublished - 9 Jan 2018
Externally publishedYes
Event2017 Cybersecurity and Cyberforensics Conference, CCC 2017 - London, United Kingdom
Duration: 21 Nov 201723 Nov 2017

Publication series

NameProceedings - 2017 Cybersecurity and Cyberforensics Conference, CCC 2017
Volume2018-September

Conference

Conference2017 Cybersecurity and Cyberforensics Conference, CCC 2017
Country/TerritoryUnited Kingdom
CityLondon
Period21/11/1723/11/17

Fingerprint

Dive into the research topics of 'Classification of Malware Using Visualisation of Similarity Matrices'. Together they form a unique fingerprint.

Cite this