Skip to main content

Smart Boosted Model for Behavior-Based Malware Analysis and Detection

  • Conference paper
  • First Online:
IoT Based Control Networks and Intelligent Systems

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 528))

Abstract

Malware analysis and detection are the most important activities to ensure system security. However, current attacks like polymorphic viruses and zero-day attacks that utilize signature-based methods complicate the detection process with accurate results. Therefore, this has—in turn—raised the need for more intelligent techniques to analyze the behavior of the malware rather than depending on the signature-based analyses. This paper proposes a machine learning-based model to analyze and detect the different types of malware. The system tries to determine the optimal feature representation and extraction and classification method that can lead to the best detection accuracy. Particularly, different machine learning algorithms were evaluated, including k-Nearest Neighbors (kNN), Multi-Layer Perceptron (MLP), Naive Bayes Classifier (NBC), Adaboost/XGBoost Decision Trees (ADT), and Support Vector Machines (SVM). The models were trained and tested using a new dataset that includes op-codes available in .asm format (generated using the IDA disassembler tool); it is a subset of data used in Kaggle for the Microsoft Classification challenges. Our empirical results revealed the superiority of the XGBoost-based model scoring an overall detection accuracy of 98.3%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kaspersky Labs (2017). What is malware, and how to defend against it? http://usa.kaspersky.com/internet-securitycenter/internet-safety/what-is-malware-andhow-to-protect-againstit#.WJZS9xt942x. Accessed 15 Feb 2017

  2. Abu Al-Haija Q, Al-Dala’ien M (2022) ELBA-IoT: an ensemble learning model for botnet attack detection in IoT networks. J Sens Actuator Netw 11:18. https://doi.org/10.3390/jsan11010018

  3. Aliyev V (2010) Using honeypots to study skill level of attackers based on the exploited vulnerabilities in the network. The Chalmers University of Technology

    Google Scholar 

  4. Horton J, Seberry J (1997) Computer viruses. An introduction. The University of Wollongong

    Google Scholar 

  5. Smith C, Matrawy A, Chow S, Abdelaziz B (2009) Computer worms: architectures, evasion strategies, and detection mechanisms. J Inf Assur Secur

    Google Scholar 

  6. Moffie M, Cheng W, Kaeli D, Zhao Q (2006) Hunting Trojan Horses. In: Proceedings of the 1st workshop on architectural and system support for improving software dependability

    Google Scholar 

  7. Chien E (2005) Techniques of adware and spyware. WWW document. https://www.symantec.com/avcenter/reference/techniques.of.adware.and.spyware.pdf

  8. Lopez W, Guerra H, Pena E, Barrera E, Sayol J (2013) Keyloggers. Florida International University

    Google Scholar 

  9. Abu Al-Haija Q, Krichen M, Abu Elhaija W (2022) Machine-learning-based darknet traffic detection system for IoT applications. Electronics 11:556. https://doi.org/10.3390/electronics11040556

  10. Prasad BJ, Annangi H, Pendyala KS (2016) Basic static malware analysis using open-source tools

    Google Scholar 

  11. Abu Al-Haija Q (2022) Top-down machine learning-based architecture for cyberattacks identification and classification in IoT communication networks. Front Big Data 4:782902

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qasem Abu Al-Haija .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abu-Zaideh, S., Snober, M.A., Al-Haija, Q.A. (2023). Smart Boosted Model for Behavior-Based Malware Analysis and Detection. In: Joby, P.P., Balas, V.E., Palanisamy, R. (eds) IoT Based Control Networks and Intelligent Systems. Lecture Notes in Networks and Systems, vol 528. Springer, Singapore. https://doi.org/10.1007/978-981-19-5845-8_58

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-5845-8_58

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-5844-1

  • Online ISBN: 978-981-19-5845-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics