Skip to main content

Malware Analysis Using Image Classification Techniques

  • Chapter
  • First Online:
Cyber Security in India

Part of the book series: IITK Directions ((IITKD,volume 4))

Abstract

These days, almost every device like mobile phones, laptops to large systems such as power grid and nuclear plants are subjected to cyberattacks. Among serious cyber threats, malware-borne threats evolve daily and have the capacity to disrupt both IT and OT systems. A typical antivirus software uses primitive approaches such as generation of signatures of known malware beforehand and then comparing newly downloaded executables against these signatures to detect malware. In recent years, the malware authors have been highly successful in evading signature-based detection techniques. However, machine-learning-based malware detection and classification have gained a lot of importance in recent time. Machine learning methods extract features from binaries using different types of analyses. Static analysis does not execute the binary, but parses the binary to extract features such as use of APIs, size of different sections, etc. The malware authors evade static-analysis-based feature extraction by code obfuscation, packing, and encryption. Therefore, dynamic analysis techniques extract features by letting the code execute in a sandbox and collecting information on runtime activities. The dynamic analysis techniques can be somehow evaded by detecting the sandbox environment and not executing any abnormal or malicious activities inside the sandbox. Therefore, there is an urgent need to find a new approach to overcome the shortcomings of static or dynamic analysis. In this chapter, we discuss an approach to analyze malware for Windows and Linux executables using image representation of the binaries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lei A, Cruickshank H, Cao Y, Asuquo P, Ogah CPA, Sun Z (2017) Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J 4(6):1832–1843

    Article  Google Scholar 

  2. Malshare- malware repository (2012). http://malshare.com/

  3. Han D, Kim H, Jang J (2017) Blockchain based smart door lock system. In: Proceedings of the international conference on information and communication technology convergence (ICTC), Jeju Island, South Korea, pp 1165–1167

    Google Scholar 

  4. The full story of the 2018 BSNL India hack (2018). https://medium.com/@kmskrishna/the-full-story-of-the-2018-bsnl-india-hack-85c98e3f10f8

  5. Airbnb engineering & data science - image classification (2018). https://medium.com/airbnb-engineering/categorizing-listing-photos-at-airbnb-f9483f3ab7e3

  6. Packer-tool upx 3.95 (2018). https://github.com/upx/upx/releases/tag/v3.95

  7. Singh A, Handa A, Kumar N, Shukla SK (2019) Malware classification using image representation. In: International symposium on cyber security cryptography and machine learning. Springer, Berlin, pp 75–92

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anand Handa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Singh, A., Handa, A., Kumar, N., Shukla, S.K. (2020). Malware Analysis Using Image Classification Techniques. In: Shukla, S., Agrawal, M. (eds) Cyber Security in India. IITK Directions, vol 4. Springer, Singapore. https://doi.org/10.1007/978-981-15-1675-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1675-7_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1674-0

  • Online ISBN: 978-981-15-1675-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics