A Survey of Malware Detection Techniques based on Machine Learning

Abstract

Diverse malware programs are set up daily focusing on attacking computer systems without the knowledge of their users. While some authors of these programs intend to steal secret information, others try quietly to prove their competence and aptitude. The traditional signature-based static technique is primarily used by anti-malware programs in order to counter these malicious codes. Although this technique excels at blocking known malware, it can never intercept new ones. The dynamic technique, which is often based on running the executable on a virtual environment, may be introduced by a number of anti-malware programs. The major drawbacks of this technique are the long period of scanning and the high consumption of resources. Nowadays, recent programs may utilize a third technique. It is the heuristic technique based on machine learning, which has proven its success in several areas based on the processing of huge amounts of data. In this paper we provide a survey of available researches utilizing this latter technique to counter cyber-attacks. We explore the different training phases of machine learning classifiers for malware detection. The first phase is the extraction of features from the input files according to previously chosen feature types. The second phase is the rejection of less important features and the selection of the most important ones which better represent the data contained in the input files. The last phase is the injection of the selected features in a chosen machine learning classifier, so that it can learn to distinguish between benign and malicious files, and give accurate predictions when confronted to previously unseen files. The paper ends with a critical comparison between the studied approaches according to their performance in malware detection.

Authors and Affiliations

Hoda El Merabet, Abderrahmane Hajraoui

Keywords

Related Articles

How to Model a Likely Behavior of a Pedagogical Agent from a Real Situation

The aim of this work is to model the behavior verbal and nonverbal behavior of a Pedagogical Agent (PA) can be integrated into an Intelligent Tutoring System. The following research questions were posed: what is the nonv...

Portable Facial Recognition Jukebox Using Fisherfaces (Frj)

A portable real-time facial recognition system that is able to play personalized music based on the identified person’s preferences was developed. The system is called Portable Facial Recognition Jukebox Using Fisherface...

Priority-Aware Virtual Machine Selection Algorithm in Dynamic Consolidation

In the past few years, many researchers attempted to tackle the problem of decreasing energy consumption in cloud data centers. One of the widely adopted techniques for this purpose is dynamic Virtual Machine (VM) consol...

Secure Steganography for Digital Images

The degree of imperceptibility of hidden image in the ‘Digital Image Steganography’ is mostly defined in relation to the limitation of Human Visual System (HVS), its chances of detection using statistical methods and its...

Spectrum Sharing Security and Attacks in CRNs: a Review

Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum shari...

Download PDF file
  • EP ID EP448875
  • DOI 10.14569/IJACSA.2019.0100148
  • Views 119
  • Downloads 0

How To Cite

Hoda El Merabet, Abderrahmane Hajraoui (2019). A Survey of Malware Detection Techniques based on Machine Learning. International Journal of Advanced Computer Science & Applications, 10(1), 366-373. https://europub.co.uk./articles/-A-448875