Intelligent Malware Detection and Classification (Intelligent Malware Sandbox)
Intelligent Malware Detection and Classification (Intelligent Malware Sandbox)
classification
(Intelligent Malware Sandbox)
January 1, 2025
IMDF 2/37 January 1, 2025
Table of Contents I
1 Introduction
Security Operation Workflow
Malware based Phishing Attacks
Different Malware Threats
Malware Analysis Techniques
Malware Analysis Techniques cont.
Traditional Signature-Based Malware Detection
Reference: [KM22]
What is Malware
Malware, short for malicious software, refers to any intrusive software
developed by cybercriminals (often called hackers) to steal data and
damage or destroy computers and computer systems.
Malware is malicious software and refers to any software that is designed
to cause harm to computer systems, networks, or users.
Malware includes various types of cyber threats such as Viruses, worms,
Trojan viruses, spyware, adware, botnets, advanced persistent threats
(APT), ransomware etc.
Malware can take many forms. Individuals and organizations need to be
aware of the different types of malware and take steps to protect their
systems, such as using antivirus software, keeping software and systems
up-to-date, and being cautious when opening email attachments or
downloading software from the internet.
Malware Classes
MALWARE TYPES
KEY-LOGGER
RANSOMWARE
VARIANTS VARIANTS
VIRUSES
TROJAN-HORSE CRYPTOMINERS
VARIANTS
VARIANTS VARIANTS
WORMS
ROOT-KIT
BOTNET
VARIANTS
VARIANTS
VARIANTS
Costly approach
Reversing
Static Analysis Requires domain expertise
engineering Code obfuscation issue
Malware Analysis
Sandbox 1
Costly approach
Dynamic analysis Sandbox 2 High resource intensive
Enviornment dependent
Sandbox 3
Time consuming
Memory based Limited exposure
Forensic analysis Highly domain
analysis dependent
Feature extraction through these approaches are highly dependence on domain knowledge
Reference: [Han+19]
Malware Codes
Table of Contents I
1 Introduction
Security Operation Workflow
Malware based Phishing Attacks
Different Malware Threats
Malware Analysis Techniques
Malware Analysis Techniques cont.
Traditional Signature-Based Malware Detection
10011001
10011011
Thank You!
Contact: sanjeev@cdac.in, Mob: 9888751254
References I
References II
[AS15] M. Arefkhani and M. Soryani. “Malware clustering using
image processing hashes”. In: 2015 9th Iranian Conference
on Machine Vision and Image Processing (MVIP) (2015),
pp. 214–218.
[Avd+15] Vitalii Avdiienko et al. “Mining apps for abnormal usage of
sensitive data”. In: 2015 IEEE/ACM 37th IEEE International
Conference on Software Engineering. Vol. 1. IEEE. 2015,
pp. 426–436.
[Bay+09] Ulrich Bayer et al. “Scalable, Behavior-Based Malware
Clustering”. In: NDSS. Vol. 9. Citeseer. 2009, pp. 8–11.
[Bee+19a] C Beek et al. McAfee Labs Threats Report August 2019.
https://www.mcafee.com/enterprise/en-
us/assets/reports/rp-quarterly-threats-aug-
2019.pdf. Accessed on 2020-24-09. Aug. 2019.
[Bee+19b] C Beek et al. “Mcafee labs threats report: August 2019”. In:
McAfee Labs (2019).
Dr. Sanjeev Kumar(CDAC) IMDF 23/37
IMDF 24/37 January 1, 2025
References III
[Bho+19] Niket Bhodia et al. “Transfer Learning for Image-Based
Malware Classification”. In: ArXiv abs/1903.11551 (2019).
[Cai+18] Haipeng Cai et al. “DroidCat: Effective Android Malware
Detection and Categorization via App-Level Profiling”. In:
IEEE Transactions on Information Forensics and Security
14.6 (2018), pp. 1455–1470.
[Cai20] Haipeng Cai. “Assessing and Improving Malware Detection
Sustainability through App Evolution Studies”. In: ACM
Transactions on Software Engineering and Methodology
(TOSEM) 29 (2020), pp. 1–28.
[Cui+18] Zhihua Cui et al. “Detection of Malicious Code Variants
Based on Deep Learning”. In: IEEE Transactions on
Industrial Informatics 14 (2018), pp. 3187–3196.
[Cui+19] Zhihua Cui et al. “Malicious code detection based on CNNs
and multi-objective algorithm”. In: J. Parallel Distributed
Comput. 129 (2019), pp. 50–58.
Dr. Sanjeev Kumar(CDAC) IMDF 24/37
IMDF 25/37 January 1, 2025
References IV
References V
References VI
References VII
[KJE20] Sanjeev Kumar, B Janet, and R Eswari. “Automated Cyber
Threat Intelligence Generation from Honeypot Data”. In:
Inventive Communication and Computational Technologies.
Springer, 2020, pp. 591–598.
[KM06] J Zico Kolter and Marcus A Maloof. “Learning to detect
and classify malicious executables in the wild.”. In: Journal
of Machine Learning Research 7.12 (2006).
[KM13] Kesav Kancherla and Srinivas Mukkamala. “Image
visualization based malware detection”. In: 2013 IEEE
Symposium on Computational Intelligence in Cyber Security
(CICS). IEEE. 2013, pp. 40–44.
[KM22] Kambey L Kisambu and Mohamedi Mjahidi. “Evaluation of
Machines Learning Algorithms in Detection of
Malware-based Phishing Attacks for Securing E-Mail
Communication”. In: CS & IT Conference Proceedings.
Vol. 12. 12. CS & IT Conference Proceedings. 2022.
References VIII
References IX
References X
References XI
References XII
References XIII
References XIV
References XV
References XVI