DETECTING MALWARE IN PORTABLE EXECUTABLE FILES USING MACHINE LEARNING APPROACH

Page 1

International Journal of Network Security & Its Applications (IJNSA) Vol.14, No.3, May 2022

DETECTING MALWARE IN PORTABLE EXECUTABLE FILES USING MACHINE LEARNING APPROACH Tuan Nguyen Kim1, Ha Nguyen Hoang2 and Nguyen Tran Truong Thien3 1

School of Computer Science, Duy Tan University, Da Nang, Vietnam 2 University of Sciences, Hue University, Vietnam 3 Cybersecurity Center, Duy Tan University, Da Nang, Vietnam

ABSTRACT There have been many solutions proposed to increase the ability to detection of malware in executable files in general and in Portable Executable files in particular. In this paper, we rely on the PE header structure of Portable Executablefiles to propose another approach in using Machine learning to classify these files, as malware files or benign files. Experimental results show that the proposed approach still uses the Random Forest algorithm for the classification problem but the accuracy and execution time are improved compared to some recent publications (accuracy reaches 99.71%).

KEYWORDS PE file, PE header, Feature, Malware, Random Forest Algorithm.

1. INTRODUCTION The term “malicious malware”, or malware, is used to refer to computer softwares that is developed for illegal purposes such as stealing data, corrupting data, damaging computers and computer systems of certain individuals and organizations. Malwares can hide/attach in any file, device on computers, and computer networks. In this article, we only focus on the types of malware hidden in executable files on the Windows operating system environment. In recent years, malware has become a significant threat to security in cyberspace. Malware may survive on terminals, migrate over networks, or be attached to/hidden in executable files, particularly Windows PE files. Currently, there are two methods for detecting malware [1-2]. Despite its high accuracy, signature-based detection confronts several challenges due to the diversity and morphing capabilities of today's malware. This difficulty may be solved using nonsignature-based detection approaches, which are frequently employed to detect "unknown" malware variants, which are potentially hazardous. When used in combination with a machine learning approach, this technology helps to classify and detect malware with high efficiency today [3-4]. PE (Portable Executable) files are executable files for the Windows operating system. These files can either be executable or contain binary code that can be used by other executable files. The format information area of PE files contains the information that the operating system needs to regulate the execution of the files once they've been loaded into main memory [5]. Because all PE files have the same structure and number of fields in the PE header, we can use these fields as input features in the process of utilizing Machine Learning algorithms to construct malware classification models for these files. DOI: 10.5121/ijnsa.2022.14302

11


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.