Malware Detection in Cloud Computing using an Image Visualization Technique

F. Abdullayeva
{"title":"Malware Detection in Cloud Computing using an Image Visualization Technique","authors":"F. Abdullayeva","doi":"10.1109/AICT47866.2019.8981727","DOIUrl":null,"url":null,"abstract":"Malware creators generate new malicious software samples by making minor changes in previously generated samples. Here, similar features of the samples from the same malware family may be used in the detection of newly generated malicious software. In this paper, a new malware detection model based on the similarity of images is proposed. Malware detection is ensured by identifying the changes made in images. For the detection of the changes in malware images, a probabilistic framework is proposed. As a result of the experiments carried out on the two images of the program code from the same class, the proposed method accurately determines the changes made to these codes. The proposed model is tested on the Malimg dataset, and the model recognizes the changes in the software code with high accuracy.","PeriodicalId":329473,"journal":{"name":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AICT47866.2019.8981727","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Malware creators generate new malicious software samples by making minor changes in previously generated samples. Here, similar features of the samples from the same malware family may be used in the detection of newly generated malicious software. In this paper, a new malware detection model based on the similarity of images is proposed. Malware detection is ensured by identifying the changes made in images. For the detection of the changes in malware images, a probabilistic framework is proposed. As a result of the experiments carried out on the two images of the program code from the same class, the proposed method accurately determines the changes made to these codes. The proposed model is tested on the Malimg dataset, and the model recognizes the changes in the software code with high accuracy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于图像可视化技术的云计算恶意软件检测
恶意软件创建者通过对先前生成的样本进行微小更改来生成新的恶意软件样本。在这里,来自同一恶意软件家族的样本的相似特征可以用于检测新生成的恶意软件。本文提出了一种基于图像相似性的恶意软件检测模型。通过识别图像中的更改来确保恶意软件检测。为了检测恶意图像的变化,提出了一个概率框架。通过对同一类程序代码的两幅图像进行实验,该方法可以准确地判断出这些代码的变化。在Malimg数据集上对该模型进行了测试,结果表明该模型对软件代码的变化具有较高的识别精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Geometric fractal index as a tool of the time series analysis Facial Emotion Recognition using Convolutional Neural Networks Algorithm Diagnosis of Anemia on the basis of the Method of the Synthesis of the Decisive Rules How to Design Dialogue Scenarios and Estimate Main Dialogue Parameters for a Voice-Controlled Man-Machine Interface A Conceptual Model of an Intelligent Platform for Security Risk Assessment in SMEs
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1