scispace - formally typeset
Open AccessJournal ArticleDOI

A Comprehensive Review on Malware Detection Approaches

Omer Aslan, +1 more
- 03 Jan 2020 - 
- Vol. 8, pp 6249-6271
Reads0
Chats0
TLDR
This paper presents a detailed review on malware detection approaches and recent detection methods which use these approaches, and the pros and cons of each detection approach, and methods that are used in these approaches.
Abstract
According to the recent studies, malicious software (malware) is increasing at an alarming rate, and some malware can hide in the system by using different obfuscation techniques. In order to protect computer systems and the Internet from the malware, the malware needs to be detected before it affects a large number of systems. Recently, there have been made several studies on malware detection approaches. However, the detection of malware still remains problematic. Signature-based and heuristic-based detection approaches are fast and efficient to detect known malware, but especially signature-based detection approach has failed to detect unknown malware. On the other hand, behavior-based, model checking-based, and cloud-based approaches perform well for unknown and complicated malware; and deep learning-based, mobile devices-based, and IoT-based approaches also emerge to detect some portion of known and unknown malware. However, no approach can detect all malware in the wild. This shows that to build an effective method to detect malware is a very challenging task, and there is a huge gap for new studies and methods. This paper presents a detailed review on malware detection approaches and recent detection methods which use these approaches. Paper goal is to help researchers to have a general idea of the malware detection approaches, pros and cons of each detection approach, and methods that are used in these approaches.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Hybrid Malware Classification Method Using Segmentation-Based Fractal Texture Analysis and Deep Convolution Neural Network Features

TL;DR: A feature fusion method to combine the features extracted from pre-trained AlexNet and Inception-v3 deep neural networks with features attained using segmentation-based fractal texture analysis (SFTA) of images representing the malware code to build a multimodal representation of malicious code.
Journal ArticleDOI

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection

TL;DR: A detailed meta-review of the existing surveys related to malware and its detection techniques, showing an arms race between these two sides of a barricade, is presented in this article.
Journal ArticleDOI

Ensemble-Based Classification Using Neural Networks and Machine Learning Models for Windows PE Malware Detection

TL;DR: An ensemble classification-based methodology for malware detection is proposed, with the best performance achieved by an ensemble of five dense and CNN neural networks, and the ExtraTrees classifier as a meta-learner.
Journal ArticleDOI

A systematic review on Deep Learning approaches for IoT security

TL;DR: This work aims at systematically reviewing and analyzing the research landscape about DL approaches applied to different IoT security scenarios and characterized these studies according to three main research questions, namely, the involved security aspects, the used DL network architectures, and the engaged datasets.
Journal ArticleDOI

A New Malware Classification Framework Based on Deep Learning Algorithms

TL;DR: In this paper, a novel deep learning-based architecture is proposed which can classify malware variants based on a hybrid model, which integrates two wide-ranging pre-trained network models in an optimized manner.
References
More filters
Journal ArticleDOI

Deriving common malware behavior through graph clustering

TL;DR: A method to construct a common behavioral graph representing the execution behavior of a family of malware instances, which has a common path, called HotPath, which is observed in all the malware instances in the same family.
Journal ArticleDOI

CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices

TL;DR: A cloud‐based anti‐malware system, called CloudEyes, which provides efficient and trusted security services for resource‐constrained devices and can outperform other existing systems with less time and communication consumption.
Journal ArticleDOI

SplitScreen: Enabling efficient, distributed malware detection

TL;DR: SplitScreen performs an additional screening step prior to the signature matching phase found in existing approaches, which naturally leads to a network-based anti-malware solution in which clients only receive signatures they needed, not every malware signature ever created as with current approaches.
Journal ArticleDOI

A framework for metamorphic malware analysis and real-time detection

TL;DR: A new framework called MARD is presented, to protect the end points that are often the last defense, against metamorphic malware, and provides automation, platform independence, optimizations for real-time performance and modularity.
Journal ArticleDOI

Employing Program Semantics for Malware Detection

TL;DR: This work proposes an evasion-proof solution that is not vulnerable to system-call injection attacks, and characterizes program semantics using asymptotic equipartition property (AEP) mainly applied in information theoretic domain.
Related Papers (5)
Trending Questions (1)
How do I scan a pixel for malware?

This shows that to build an effective method to detect malware is a very challenging task, and there is a huge gap for new studies and methods.