A Survey of Malware Detection Techniques based on Machine Learning

Abstract

Diverse malware programs are set up daily focusing on attacking computer systems without the knowledge of their users. While some authors of these programs intend to steal secret information, others try quietly to prove their competence and aptitude. The traditional signature-based static technique is primarily used by anti-malware programs in order to counter these malicious codes. Although this technique excels at blocking known malware, it can never intercept new ones. The dynamic technique, which is often based on running the executable on a virtual environment, may be introduced by a number of anti-malware programs. The major drawbacks of this technique are the long period of scanning and the high consumption of resources. Nowadays, recent programs may utilize a third technique. It is the heuristic technique based on machine learning, which has proven its success in several areas based on the processing of huge amounts of data. In this paper we provide a survey of available researches utilizing this latter technique to counter cyber-attacks. We explore the different training phases of machine learning classifiers for malware detection. The first phase is the extraction of features from the input files according to previously chosen feature types. The second phase is the rejection of less important features and the selection of the most important ones which better represent the data contained in the input files. The last phase is the injection of the selected features in a chosen machine learning classifier, so that it can learn to distinguish between benign and malicious files, and give accurate predictions when confronted to previously unseen files. The paper ends with a critical comparison between the studied approaches according to their performance in malware detection.

Authors and Affiliations

Hoda El Merabet, Abderrahmane Hajraoui

Keywords

Related Articles

A Rich Feature-based Kernel Approach for Drug- Drug Interaction Extraction

Discovering drug-drug interactions (DDIs) is a crucial issue for both patient safety and health care cost control. Developing text mining techniques for identifying DDIs has attracted a great deal of attention in the las...

Information System Evaluation based on Multi-Criteria Decision Making: A Comparison of Two Sectors

In this article, our purpose is to introduce the results of a new approach to assess the information system success. It is based on the DeLone and McLean model and was applied on two domains. The chosen domains are banki...

 A Simple Strategy to Start Domain Ontology from Scratch

 Aiming the usage of Domain Ontology as an educational tool for neophyte students and focusing in a fast and easy way to start Domain Ontology from scratch, the semantics are set aside to identify contexts of concep...

Containing a Confused Deputy on x86: A Survey of Privilege Escalation Mitigation Techniques

The weak separation between user- and kernelspace in modern operating systems facilitates several forms of privilege escalation. This paper provides a survey of protection techniques, both cutting-edge and time-tested, u...

Comparison and Analysis of Different Software Cost Estimation Methods

Software cost estimation is the process of predicting the effort required to develop a software system. The basic input for the software cost estimation is coding size and set of cost drivers, the output is Effort in ter...

Download PDF file
  • EP ID EP448875
  • DOI 10.14569/IJACSA.2019.0100148
  • Views 81
  • Downloads 0

How To Cite

Hoda El Merabet, Abderrahmane Hajraoui (2019). A Survey of Malware Detection Techniques based on Machine Learning. International Journal of Advanced Computer Science & Applications, 10(1), 366-373. https://europub.co.uk/articles/-A-448875