Abstract
These days, almost every device like mobile phones, laptops to large systems such as power grid and nuclear plants are subjected to cyberattacks. Among serious cyber threats, malware-borne threats evolve daily and have the capacity to disrupt both IT and OT systems. A typical antivirus software uses primitive approaches such as generation of signatures of known malware beforehand and then comparing newly downloaded executables against these signatures to detect malware. In recent years, the malware authors have been highly successful in evading signature-based detection techniques. However, machine-learning-based malware detection and classification have gained a lot of importance in recent time. Machine learning methods extract features from binaries using different types of analyses. Static analysis does not execute the binary, but parses the binary to extract features such as use of APIs, size of different sections, etc. The malware authors evade static-analysis-based feature extraction by code obfuscation, packing, and encryption. Therefore, dynamic analysis techniques extract features by letting the code execute in a sandbox and collecting information on runtime activities. The dynamic analysis techniques can be somehow evaded by detecting the sandbox environment and not executing any abnormal or malicious activities inside the sandbox. Therefore, there is an urgent need to find a new approach to overcome the shortcomings of static or dynamic analysis. In this chapter, we discuss an approach to analyze malware for Windows and Linux executables using image representation of the binaries.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lei A, Cruickshank H, Cao Y, Asuquo P, Ogah CPA, Sun Z (2017) Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J 4(6):1832–1843
Malshare- malware repository (2012). http://malshare.com/
Han D, Kim H, Jang J (2017) Blockchain based smart door lock system. In: Proceedings of the international conference on information and communication technology convergence (ICTC), Jeju Island, South Korea, pp 1165–1167
The full story of the 2018 BSNL India hack (2018). https://medium.com/@kmskrishna/the-full-story-of-the-2018-bsnl-india-hack-85c98e3f10f8
Airbnb engineering & data science - image classification (2018). https://medium.com/airbnb-engineering/categorizing-listing-photos-at-airbnb-f9483f3ab7e3
Packer-tool upx 3.95 (2018). https://github.com/upx/upx/releases/tag/v3.95
Singh A, Handa A, Kumar N, Shukla SK (2019) Malware classification using image representation. In: International symposium on cyber security cryptography and machine learning. Springer, Berlin, pp 75–92
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Singh, A., Handa, A., Kumar, N., Shukla, S.K. (2020). Malware Analysis Using Image Classification Techniques. In: Shukla, S., Agrawal, M. (eds) Cyber Security in India. IITK Directions, vol 4. Springer, Singapore. https://doi.org/10.1007/978-981-15-1675-7_4
Download citation
DOI: https://doi.org/10.1007/978-981-15-1675-7_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1674-0
Online ISBN: 978-981-15-1675-7
eBook Packages: EngineeringEngineering (R0)