Review of Contemporary Literature on Machine Learning based Malware Analysis and Detection Strategies

α
G. Bala Krishna
G. Bala Krishna
σ
V. Radha
V. Radha
ρ
K. Venugopala Rao
K. Venugopala Rao
α Jawaharlal Nehru Technological University, Hyderabad

Send Message

To: Author

Review of Contemporary Literature on Machine Learning based Malware Analysis and Detection Strategies

Article Fingerprint

ReserarchID

CSTNWSIUC9F

Review of Contemporary Literature on Machine Learning based Malware Analysis and Detection Strategies Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Malicious software also known as malware are the critical security threat experienced by the current ear of internet and computer system users. The malwares can morph to access or control the system level operations in multiple dimensions. The traditional malware detection strategies detects by signatures, which are not capable to notify the unknown malwares. The machine learning models learns from the behavioral patterns of the existing malwares and attempts to notify the malwares with similar behavioral patterns, hence these strategies often succeeds to notify even about unknown malwares. This manuscript explored the detailed review of machine learning based malware detection strategies found in contemporary literature.

References

61 Cites in Article
  1. (2016). Références Referencias.
  2. Gary Mcgraw,Greg Morrisett (2000). Attacking Malicious Code: A Report to the Infosec Research Council.
  3. L Xufang,P Loh,F Tan (2011). Mechanisms of Polymorphic and Metamorphic Viruses.
  4. (2013). Unknown Title.
  5. R Berkenkopf (2010). Unknown Title.
  6. Y Ye (2009). Intelligent file scoring system for malware detection from the gray list.
  7. K Rieck (2012). Malheur A novel tool for malware analysis.
  8. Cristian Pinzón,Juan De Paz,Dante Tapia,Javier Bajo,Juan Corchado (2012). Improving the security level of the FUSION@ multi-agent architecture.
  9. Ammar Ahmed,E Elhadi,M Maarof,A Osman (2012). Malware Detection Based on Hybrid Signature Behaviour Application Programming Interface Call Graph.
  10. P Kevadia Kaushal,Nilesh Prajapati (2012). Metamorphic Malware Detection Using Statistical Analysis.
  11. T Yanfang Ye,Weiwei Shenghuo Zhu,Zhuang,Umesh Egementas,Melihabdulhayoglu Gupta (2011). Combining file content and file relations for cloud based malware detection.
  12. M Christodorescu,S Jha,S Seshia,D Song,R Bryant (2005). Semantics-aware malware detection.
  13. H Yin (2007). Panorama: capturing systemwide information flow for malware detection and analysis.
  14. P Vinod (2009). Survey on Malware Detection Methods.
  15. L Zeltser,X Jiang,X Wang,D Xu (2007). what is cloud Anti-Virus and how it does work.
  16. (2007). Automated dynamic binary analysis.
  17. Deepak Venugopal,G (2008). Efficient signature based malware detection on mobile devices.
  18. C Kolbitsch (2009). Effective and efficient malware detection at the end host.
  19. S Zhou (2009). A Heuristic Approach for Detection of Obfuscated Malware.
  20. M Ahmed (2009). NIDS: A Network Based Approach to Intrusion Detection and Prevention.
  21. Tal Garfinkel,Ben Pfaff,Jim Chow,Mendel Rosenblum,Dan Boneh (2003). Terra.
  22. H Lagar-Cavilla (2009). Flexible Computing with Virtual Machines.
  23. V Gorodetsky (2007). Multi-agent Peer-to-Peer Intrusion Detection Computer Network Security.
  24. Xiao-Ling Ye,Ying-Chao Zhang,Chao-Long Zhang,Chao Chen,Xin-Yi Huang (2009). A Mobile Agent and Snort Based Distributed Intrusion Detection System.
  25. C. -M Ou,C Ou (2010). Agent-Based immunity for computer virus: abstraction from dendritic cell algorithm with danger theory.
  26. S Bijani,D Robertson (2011). Intrusion detection in open peer-to-peer multi-agent systems.
  27. H Dong (2011). Research on adaptive distributed intrusion detection system model based on Multi-Agent.
  28. C Ou (2011). Multiagent-based computer virus detection systems: abstraction from dendritic cell algorithm with danger theory.
  29. Paritosh Das,Rajdeep Niyogi (2012). A Temporal Logic Based Approach to Multi-Agent Intrusion Detection and Prevention.
  30. C Moser,E Kruegel,Kirda (2007). Limits of static analysis for malware detection.
  31. P Okane,S Sezer,K Mclaughlin (2011). Obfuscation: the hidden malware.
  32. Silvio Cesare,Yang Xiang (2012). Software Similarity Searching and Classification.
  33. M Rajagopalan,M Hiltunen,T Jim,R Schlichting (2006). System call monitoring using authenticated system calls.
  34. M Abadi,M Budiu,U Erlingsson,J Ligatti (2005). Control-´flow integrity.
  35. V Sathyanarayan,Pankaj Kohli,Bezawada Bruhadeshwar (2008). Signature Generation and Detection of Malware Families.
  36. B Sami,H Yadegari,N Rahimi,S Peiravian,A Hashemi,Hamze (2010). Malware detection based on mining API calls.
  37. Y Ye,D Wang,T Li,D Ye (2007). IMDS: intelligent malware detection system.
  38. M Alazab,S Venkatraman,P Watters (2011). Zeroday malware detection based on supervised learning algorithms of API call signatures.
  39. Ronghua Tian,Rafiqul Islam,Lynn Batten,Steve Versteeg (2010). Differentiating malware from cleanware using behavioural analysis.
  40. M Shankarapani,K Kancherla,S Ramammoorthy,R Movva,S Mukkamala (2010). Kernel machines for malware classification and similarity analysis.
  41. M Shankarapani,S Ramamoorthy,R Movva,S Mukkamala (2011). Malware detection using assembly and API call sequences.
  42. F Ahmed,H Hameed,M Shafiq,M Farooq (2009). Using spatiotemporal linformationin API call swithmachinelea rning algorithms for malware detection.
  43. Yong Qiao,Yuexiang Yang,Jie He,Chuan Tang,Zhixue Liu (2014). CBM: Free, Automatic Malware Analysis Framework Using API Call Sequences.
  44. Y Qiao,Y Yang,L Ji,He (2013). Analyzing malware by abstracting the frequent item sets in API call sequences.
  45. J Bergeron,M Debbabi,J Desharnais,M Erhioui,Y Lavoie,N Tawbi (2001). Static detection of malicious code in executable programs.
  46. J. -W Jang,J Woo,J Yun,H Kim (2014). Malnetminer: malware classification based on social network analysis of call graph.
  47. Konrad Rieck,Philipp Trinius,Carsten Willems,Thorsten Holz (2011). Automatic analysis of malware behavior using machine learning.
  48. C Linn,M Rajagopalan,S Baker,C Collberg,S Debray,J Hartman (2005). Protecting against unexpected system calls.
  49. Blake Anderson,Daniel Quist,Joshua Neil,Curtis Storlie,Terran Lane (2011). Graph-based malware detection using dynamic analysis.
  50. U Bayer,P Comparetti,C Hlauschek,C Kruegel (2009). Scalable, Behavior-Based Malware Clustering.
  51. (null). Papio anubis Olive Baboon (Anubis Baboon) : Fr. Babouin Doguera; Ger. Anubispavian.
  52. P Indyk,R Motwani (1998). Approximate Nearest Neighbor: Towards Removing the Curse of Dimensionality.
  53. M Biley,J Oberheid,J Andersen,Z Morley Mao,F Jahanian,J Nazario (2007). Automated Classification and Analysis of Internet Malware.
  54. Y Park,D Reeves,V Mulukutla,B Sundaravel (2010). Fast Malware Classification by Automated Behavioral Graph Matching.
  55. I Firdausi,C Lim,A Erwin (2010). Analysis of Machine Learning Techniques Used in Behavior Based Malware Detection.
  56. S Nari,A Ghorbani (2013). Automated malware classification based on network behavior.
  57. M Hall,E Frank,G Holmes,B Pfahringer,P Reutemann,I Witten (2009). The WEKA Data Mining Software: An Update.
  58. T Lee,J Mody (2006). Proceedings of the 2006 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing couuntries - SAICSIT '06.
  59. I Santos,J Devesa,F Brezo,J Nieves,P Bringas (2013). OPEM: A Static-Dynamic Approach for Machine Learning Based Malware Detection.
  60. R Islam,R Tian,L Battenb,S Versteeg (2013). Classification of Malware Based on Integrated Static and Dynamic Features.
  61. Blake Anderson,Curtis Storlie,Terran Lane (2012). Improving malware classification.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

G. Bala Krishna. 2016. \u201cReview of Contemporary Literature on Machine Learning based Malware Analysis and Detection Strategies\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 16 (GJCST Volume 16 Issue E5): .

Download Citation

Issue Cover
GJCST Volume 16 Issue E5
Pg. 17- 22
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-E Classification: C.2.0, D.4.6, H.2.7
Version of record

v1.2

Issue date

July 19, 2016

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 7487
Total Downloads: 1903
2026 Trends
Related Research

Published Article

Malicious software also known as malware are the critical security threat experienced by the current ear of internet and computer system users. The malwares can morph to access or control the system level operations in multiple dimensions. The traditional malware detection strategies detects by signatures, which are not capable to notify the unknown malwares. The machine learning models learns from the behavioral patterns of the existing malwares and attempts to notify the malwares with similar behavioral patterns, hence these strategies often succeeds to notify even about unknown malwares. This manuscript explored the detailed review of machine learning based malware detection strategies found in contemporary literature.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Review of Contemporary Literature on Machine Learning based Malware Analysis and Detection Strategies

G. Bala Krishna
G. Bala Krishna Jawaharlal Nehru Technological University, Hyderabad
V. Radha
V. Radha
K. Venugopala Rao
K. Venugopala Rao

Research Journals