Publication:
Memory Forensics-Based Malware Detection Using Computer Vision and Machine Learning

dc.citedby2
dc.contributor.authorShah S.S.H.en_US
dc.contributor.authorAhmad A.R.en_US
dc.contributor.authorJamil N.en_US
dc.contributor.authorKhan A.U.R.en_US
dc.contributor.authorid57878344500en_US
dc.contributor.authorid57878026300en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid55602487700en_US
dc.date.accessioned2023-05-29T09:36:46Z
dc.date.available2023-05-29T09:36:46Z
dc.date.issued2022
dc.description.abstractMalware has recently grown exponentially in recent years and poses a serious threat to individual users, corporations, banks, and government agencies. This can be seen from the growth of Advanced Persistent Threats (APTs) that make use of advance and sophisticated malware. With the wide availability of computer-automated tools such as constructors, email flooders, and spoofers. Thus, it is now easy for users who are not technically inclined to create variations in existing malware. Researchers have developed various defense techniques in response to these threats, such as static and dynamic malware analyses. These techniques are ineffective at detecting new malware in the main memory of the computer and otherwise require considerable effort and domain-specific expertise. Moreover, recent techniques of malware detection require a long time for training and occupy a large amount of memory due to their reliance on multiple factors. In this paper, we propose a computer vision-based technique for detecting malware that resides in the main computer memory in which our technique is faster or memory efficient. It works by taking portable executables in a virtual environment to extract memory dump files from the volatile memory and transform them into a particular image format. The computer vision-based contrast-limited adaptive histogram equalization and the wavelet transform are used to improve the contrast of neighboring pixel and to reduce the entropy. We then use the support vector machine, random forest, decision tree, and XGBOOST machine learning classifiers to train the model on the transformed images with dimensions of 112 � 112 and 56 � 56. The proposed technique was able to detect and classify malware with an accuracy rate of 97.01%. Its precision, recall, and F1-score were 97.36%, 95.65%, and 96.36%, respectively. Our finding shows that our technique in preparing dataset with more efficient features to be trained by the Machine Learning classifiers has resulted in significant performance in terms of accuracy, precision, recall, F1-score, speed and memory consumption. The performance has superseded most of the existing techniques in its unique approach. � 2022 by the authors.en_US
dc.description.natureFinalen_US
dc.identifier.ArtNo2579
dc.identifier.doi10.3390/electronics11162579
dc.identifier.issue16
dc.identifier.scopus2-s2.0-85137398687
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85137398687&doi=10.3390%2felectronics11162579&partnerID=40&md5=0d2d1b9ba388641bfb5e5c0fd125a0a2
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/26795
dc.identifier.volume11
dc.publisherMDPIen_US
dc.relation.ispartofAll Open Access, Gold
dc.sourceScopus
dc.sourcetitleElectronics (Switzerland)
dc.titleMemory Forensics-Based Malware Detection Using Computer Vision and Machine Learningen_US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Collections