Image-Based Malware Detection Using α-Cuts and Binary Visualisation

نویسندگان

چکیده

Image conversion of malicious binaries, or binary visualisation, is a relevant approach in the security community. Recently, it has exceeded role single-file malware analysis tool and become part Intrusion Detection Systems (IDSs) thanks to adoption Convolutional Neural Networks (CNNs). However, there been little effort toward image segmentation for converted images. In this study, we propose novel method that serves dual purpose: (a) enhances colour pattern segmentation, (b) achieves sparse representation According this, considered R, G, B values each pixel as respective fuzzy sets. We then performed α-cuts defuzzification across all pixels image, which them matrices 0s 1s. Our was tested on variety dataset sizes evaluated according detection rates hyperparameterised ResNet50 models. findings demonstrated larger datasets, representations intelligently coloured images can exceed model performance unprocessed ones, with 93.60% accuracy, 94.48% precision, 92.60% recall, 93.53% f-score. This first time were used processing our results, believe they provide an important contribution challenging datasets. Overall, shows integrated component image-based IDS operations other demanding real-time practices.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Malware, Viruses and Log Visualisation

This paper will look at the current state of visualization in relation to mainly malware collector logs, network logs and the possibility of visualizing their payloads. We will show that this type of visualization of activity on the network can help us in the forensic investigation of the traffic, which may contain unwanted pieces of cod, and may identify any patterns within the traffic or payl...

متن کامل

Malware Detection using Classification of Variable-Length Sequences

In this paper, a novel method based on the graph is proposed to classify the sequence of variable length as feature extraction. The proposed method overcomes the problems of the traditional graph with variable length of data, without fixing length of sequences, by determining the most frequent instructions and insertion the rest of instructions on the set of “other”, save speed and memory. Acco...

متن کامل

Behaviour Based Malware Detection

This article looks at the future of antivirus technology in IT security, discussing some of the latest malware threats and counter developments. We specifically examine key developments in proactive malware detection based on real-time behavioural analysis, to combat 0-day threats.

متن کامل

Graph Cuts based Image Segmentation using Fuzzy Rule Based System

This work deals with segmentation of the gray scale, color and texture images using graph cuts. From an input image, a graph is constructed using intensity, color and texture profiles of the image simultaneously (i.e., intensity and texture for gray scale images and color and texture for color images). Based on the nature of image, a fuzzy rule based system is designed to find the weight that s...

متن کامل

Permission-Based Android Malware Detection

Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them, Android-based mobile devices had appeared lately and, they were now an ideal target for attackers. Android-based smartphone users can get free applications from Android Application Market. But, these applications were not certified by legitimate organizations and the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13074624