A simhash-based integrative features extraction algorithm for malware detection

11Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

Abstract

In the malware detection process, obfuscated malicious codes cannot be efficiently and accurately detected solely in the dynamic or static feature space. Aiming at this problem, an integrative feature extraction algorithm based on simhash was proposed, which combines the static information e.g., API (Application Programming Interface) calls and dynamic information (such as file, registry and network behaviors) of malicious samples to form integrative features. The experiment extracts the integrative features of some static information and dynamic information, and then compares the classification, time and obfuscated-detection performance of the static, dynamic and integrated features, respectively, by using several common machine learning algorithms. The results show that the integrative features have better time performance than the static features, and better classification performance than the dynamic features, and almost the same obfuscated-detection performance as the dynamic features. This algorithm can provide some support for feature extraction of malware detection.

Cite

CITATION STYLE

APA

Li, Y., Liu, F., Du, Z., & Zhang, D. (2018). A simhash-based integrative features extraction algorithm for malware detection. Algorithms, 11(8). https://doi.org/10.3390/a11080124

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free