The malware detection challenge of accuracy

Mohammad Akour, Izzat Alsmadi, Mamoun Alazab

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedingspeer-review


Real time Malware detection is still a big challenge; although considerable research showed advances of design and build systems that can automatically predicate the maliciousness of specific file, program, or website, Malware is continuously growing in terms of numbers and maliciousness. Web-based Malware detection is also growing with the expansion of the Internet and the availability of higher speeds and bandwidths. In this paper, we design, develop and evaluate an application that able to determine whether targeted website is malicious or not by utilizing available detection APIs. These APIs are able to communicate with several public scanners and Malware repositories. While the availability of many public scanners can help utilize those public services, however due to the fact that in most cases, they produce conflicting decisions, the process to make a final detection inference is not a trivial task. We conducted experiments to evaluate the different decision outcomes that come from the different scanners that utilized machine learning, data mining and other techniques. We also evaluated the issue of "unrated" decision based on the different Malware scanners.

Original languageEnglish
Title of host publication2016 2nd International Conference on Open Source Software Computing, OSSCOM 2016
Place of PublicationPiscataway, NJ
PublisherIEEE, Institute of Electrical and Electronics Engineers
Number of pages6
ISBN (Electronic)9781509045808
Publication statusPublished - 23 Feb 2017
Externally publishedYes
Event2nd International Conference on Open Source Software Computing, OSSCOM 2016 - Beirut, Lebanon
Duration: 1 Dec 20163 Dec 2016


Conference2nd International Conference on Open Source Software Computing, OSSCOM 2016


Dive into the research topics of 'The malware detection challenge of accuracy'. Together they form a unique fingerprint.

Cite this