Memory Visualization-Based Malware Detection Technique

Computer vision; Machine learning; Malware; Network security; Sensitive data; Visualization; Wavelet transforms; Advanced persistent threat; Data engineering; De-noising; Denoising filters; Machine-learning; Malware analysis; Malwares; Memory analysis; Polymorphic malware; Wavelets transform; Energy...

Full description

Saved in:
Bibliographic Details
Main Authors: Shah S.S.H., Jamil N., Khan A.U.R.
Other Authors: 57878344500
Format: Article
Published: MDPI 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Tenaga Nasional
id my.uniten.dspace-26731
record_format dspace
spelling my.uniten.dspace-267312023-05-29T17:36:23Z Memory Visualization-Based Malware Detection Technique Shah S.S.H. Jamil N. Khan A.U.R. 57878344500 36682671900 55602487700 Computer vision; Machine learning; Malware; Network security; Sensitive data; Visualization; Wavelet transforms; Advanced persistent threat; Data engineering; De-noising; Denoising filters; Machine-learning; Malware analysis; Malwares; Memory analysis; Polymorphic malware; Wavelets transform; Energy security; computer security; machine learning; Computer Security; Machine Learning Advanced Persistent Threat is an attack campaign in which an intruder or team of intruders establishes a long-term presence on a network to mine sensitive data, which becomes more dangerous when combined with polymorphic malware. This type of malware is not only undetectable, but it also generates multiple variants of the same type of malware in the network and remains in the system�s main memory to avoid detection. Few researchers employ a visualization approach based on a computer�s memory to detect and classify various classes of malware. However, a preprocessing step of denoising the malware images was not considered, which results in an overfitting problem and prevents us from perfectly generalizing a model. In this paper, we introduce a new data engineering approach comprising two main stages: Denoising and Re-Dimensioning. The first aims at reducing or ideally removing the noise in the malware�s memory-based dump files� transformed images. The latter further processes the cleaned image by compressing them to reduce their dimensionality. This is to avoid the overfitting issue and lower the variance, computing cost, and memory utilization. We then built our machine learning model that implements the new data engineering approach and the result shows that the performance metrics of 97.82% for accuracy, 97.66% for precision, 97.25% for recall, and 97.57% for f1-score are obtained. Our new data engineering approach and machine learning model outperform existing solutions by 0.83% accuracy, 0.30% precision, 1.67% recall, and 1.25% f1-score. In addition to that, the computational time and memory usage have also reduced significantly. � 2022 by the authors. Final 2023-05-29T09:36:23Z 2023-05-29T09:36:23Z 2022 Article 10.3390/s22197611 2-s2.0-85139811986 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85139811986&doi=10.3390%2fs22197611&partnerID=40&md5=9a1ca29f6242b1ed6bbfcda47ab53340 https://irepository.uniten.edu.my/handle/123456789/26731 22 19 7611 All Open Access, Gold, Green MDPI Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Computer vision; Machine learning; Malware; Network security; Sensitive data; Visualization; Wavelet transforms; Advanced persistent threat; Data engineering; De-noising; Denoising filters; Machine-learning; Malware analysis; Malwares; Memory analysis; Polymorphic malware; Wavelets transform; Energy security; computer security; machine learning; Computer Security; Machine Learning
author2 57878344500
author_facet 57878344500
Shah S.S.H.
Jamil N.
Khan A.U.R.
format Article
author Shah S.S.H.
Jamil N.
Khan A.U.R.
spellingShingle Shah S.S.H.
Jamil N.
Khan A.U.R.
Memory Visualization-Based Malware Detection Technique
author_sort Shah S.S.H.
title Memory Visualization-Based Malware Detection Technique
title_short Memory Visualization-Based Malware Detection Technique
title_full Memory Visualization-Based Malware Detection Technique
title_fullStr Memory Visualization-Based Malware Detection Technique
title_full_unstemmed Memory Visualization-Based Malware Detection Technique
title_sort memory visualization-based malware detection technique
publisher MDPI
publishDate 2023
_version_ 1806425609069395968