Scattered feature space for malware analysis

5Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Malware prevention methods are gaining attention amongst researchers due to proliferation of new variants. Malware detection methods can be basically categorized as static and dynamic. In this paper, we investigate the use of features like Portable Executable (PE) headers and body (mnemonic n-gram, instruction opcodes) for classifying the executables as malware or benign. The features are preprocessed using Scatter Criterion to reduce the processing overheads incurred during training and testing phase by reducing the dimensionality of the feature space. The results of our experimental study show that the proposed methods can detect packed and obfuscated variants of malware as well as classify malware and benign executables. Through our proposed work we also highlight that the PE Header fields are less obfuscated in comparison with the raw data present in body of executables. Thus, evolutionary possibilities are more pronounced in malware code or Hex dump other than PE Header Fields. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Vinod, P., Laxmi, V., & Gaur, M. S. (2011). Scattered feature space for malware analysis. In Communications in Computer and Information Science (Vol. 190 CCIS, pp. 562–571). https://doi.org/10.1007/978-3-642-22709-7_55

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free