2022
DOI: 10.3390/computers11110160
|View full text |Cite
|
Sign up to set email alerts
|

Features Engineering for Malware Family Classification Based API Call

Abstract: Malware is used to carry out malicious operations on networks and computer systems. Consequently, malware classification is crucial for preventing malicious attacks. Application programming interfaces (APIs) are ideal candidates for characterizing malware behavior. However, the primary challenge is to produce API call features for classification algorithms to achieve high classification accuracy. To achieve this aim, this work employed the Jaccard similarity and visualization analysis to find the hidden patter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…The first five methods are classic methods [14,[44][45][46][47] to do the malware family classification, and we report the results from their papers. The following five methods [16,20,21,23,48] are the latest effective work on the classification based on API calls, so we reproduce the methods and offer a convincing comparison result. The [21] method adopts a two-way feature extraction architecture for API calls, but the core module is a multi-layer CNN, and the correlation analysis is performed through Bi-LSTM.…”
Section: Comparison With Previous Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The first five methods are classic methods [14,[44][45][46][47] to do the malware family classification, and we report the results from their papers. The following five methods [16,20,21,23,48] are the latest effective work on the classification based on API calls, so we reproduce the methods and offer a convincing comparison result. The [21] method adopts a two-way feature extraction architecture for API calls, but the core module is a multi-layer CNN, and the correlation analysis is performed through Bi-LSTM.…”
Section: Comparison With Previous Methodsmentioning
confidence: 99%
“…The results of their endeavors demonstrate significant performance enhancements when compared to baseline methodologies, highlighting the efficacy of introducing additional intrinsic features associated with APIs. Some works consider the similarity among the features, especially API call sequences, and employ similarity to do the encoder, followed by some advanced models such as GNN [22], Random Forest, LSTM [23], and F-RCNN [24].…”
Section: Deep Learning-based or Api-call-related Malware Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Hansen et al [26] employed API call sequences and frequency to identify and classify malware by utilising the Random Forest classifier. Daeef et al [27] proposed a method to uncover the underlying patterns of malicious behaviour among different malware families by utilising the Jaccard index and visualisation techniques. J. Singh et al [28] and Albishry et al [29] explained how ML techniques have been widely utilised in the field of malware detection.…”
Section: Related Workmentioning
confidence: 99%
“…The results of a recent research [1,2] carried out by AV-TEST reveal that more than 9 million new instances of malicious software have been launched, and that there are presently 1363.92 million detected instances of malicious software functioning in the environment. These results underline the need for significant and continuing technological improvement in order to avoid the emergence of new dangers.…”
Section: Introductionmentioning
confidence: 99%