Araştırma Makalesi
BibTex RIS Kaynak Göster

Görüntü Tabanlı Kötü Amaçlı Yazılım Sınıflandırması için Hibrit Bir Derin Öğrenme Yaklaşımı

Yıl 2026, Cilt: 5 Sayı: 1, 26 - 43, 28.02.2026
https://doi.org/10.62520/fujece.1582676
https://izlik.org/JA58XJ69UK

Öz

Kötü amaçlı içeriklerin çeşitliliği ve karmaşıklığı, Bilgi ve İletişim Teknolojilerinin son kullanıcılarını önemli ölçüde etkilemiştir. Kötü amaçlı içeriklerin etkisini azaltmak için, kullanıcı sistemlerini kötü amaçlı yazılımlara karşı proaktif olarak korumak üzere otomatikleştirilmiş derin öğrenme tabanlı teknikler geliştirilmiştir. Bu çalışmada, MaleVis veri setini kullanarak kötü amaçlı yazılımların tespiti ve sınıflandırılması için hibrit bir model uyguluyoruz. İlk olarak, veri setinden özellik çıkarma işlemi DenseNet-121, EfficientNet-B0 ve ResNet-50 modelleri kullanılarak gerçekleştirilmiştir. Bu modeller, büyük veri setleri üzerinde eğitilmiş ve güçlü özellik çıkarma yetenekleriyle bilinen derin öğrenme mimarileridir. Her model, Malevis veri setindeki görüntülerden özellik vektörleri çıkarmak için kullanılmıştır. Bu özellik vektörleri daha sonra birleştirilmiştir. Birleştirilen özellik vektörleri, güçlü bir sınıflandırma algoritması olan XGBoost kullanılarak sınıflandırma için kullanılmıştır. Bu hibrit model yaklaşımı, kötü amaçlı yazılımları tespit etmek için derin öğrenme modellerinin özellik çıkarma yeteneklerini XGBoost'un sınıflandırma yeteneği ile birleştirir. Deney sonuçları, önerilen hibrit modelin MaleVis veri setinde yüksek doğruluk oranları elde ettiğini göstermektedir. Çalışma, farklı derin öğrenme modellerinin özellik çıkarma yeteneklerini birleştirmenin ve bu özellikleri XGBoost gibi bir sınıflandırıcıyla kullanmanın kötü amaçlı yazılımların algılanması ve sınıflandırılmasında önemli iyileştirmeler sağlayabileceğini göstermektedir. Sonuçlar, modelin gerçek dünyadaki tehdit algılama sistemlerine entegre edilme potansiyelini ortaya koymaktadır.

Etik Beyan

Hazırlanan makale için etik kurul onayı gerekmemektedir. Hazırlanan makalede herhangi bir kişi/kurumla çıkar çatışması bulunmamaktadır.

Destekleyen Kurum

(TUBITAK) Proje No: 122E337

Teşekkür

Bu çalışma, Fırat Üniversitesi Bilimsel Araştırma Projeleri Koordinasyon Birimi (FUBAP) tarafından TEKF 24.27 proje numarası ve Türkiye Bilim ve Teknolojik Araştırma Konseyi (TÜBİTAK) tarafından 122E337 proje numarası ile desteklenmiştir. Ayrıca, yazarlar, yapıcı ve hızlı geri bildirimleriyle bu çalışmanın akademik gelişimine olumlu katkıda bulunan editör(ler)e ve isimsiz hakemlere içtenlikle teşekkür ederler.

Kaynakça

  • A. Di Nicola, “Towards digital organized crime and digital sociology of organized crime,” Trends Organ. Crime, pp. 1–20, 2022.
  • Y. Zhang, Y. Xiao, K. Ghaboosi, J. Zhang, and H. Deng, “A survey of cyber crimes,” Secur. Commun. Netw., vol. 5, no. 4, pp. 422–437, 2012.
  • A. Chakraborty, A. Biswas, and A. K. Khan, “Artificial intelligence for cybersecurity: Threats, attacks and mitigation,” in Artificial Intelligence for Societal Issues. Cham, Switzerland: Springer, 2023, pp. 3–25.
  • Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions,” Electron., vol. 12, no. 6, p. 1333, 2023.
  • E. M. Rudd, A. Rozsa, M. Günther, and T. E. Boult, “A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions,” IEEE Commun. Surv. Tutor., vol. 19, no. 2, pp. 1145–1172, 2016.
  • S. S. Chakkaravarthy, D. Sangeetha, and V. Vaidehi, “A survey on malware analysis and mitigation techniques,” Comput. Sci. Rev., vol. 32, pp. 1–23, 2019.
  • J. G. Heiser, “Understanding today’s malware,” Inf. Secur. Tech. Rep., vol. 9, no. 2, pp. 47–64, 2004.
  • F. A. Aboaoja, A. Zainal, F. A. Ghaleb, B. A. S. Al-Rimy, T. A. E. Eisa, and A. A. H. Elnour, “Malware detection issues, challenges, and future directions: A survey,” Appl. Sci., vol. 12, no. 17, p. 8482, 2022.
  • M. I. Malik, A. Ibrahim, P. Hannay, and L. F. Sikos, “Developing resilient cyber-physical systems: A review of state-of-the-art malware detection approaches, gaps, and future directions,” Computers, vol. 12, no. 4, p. 79, 2023.
  • A. Thakkar and R. Lohiya, “A review on machine learning and deep learning perspectives of IDS for IoT: Recent updates, security issues, and challenges,” Arch. Comput. Methods Eng., vol. 28, no. 4, pp. 3211–3243, 2021.
  • Z. Chen et al., “Machine learning-enabled IoT security: Open issues and challenges under advanced persistent threats,” ACM Comput. Surv., vol. 55, no. 5, pp. 1–37, 2022.
  • L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath, “Malware images: Visualization and automatic classification,” in Proc. 8th Int. Symp. Visualization Cyber Secur., 2011, pp. 1–7.
  • M. Goyal and R. Kumar, “IVMCT: Image visualization based multiclass malware classification using transfer learning,” Math. Stat. Eng. Appl., vol. 71, no. 2, pp. 42–50, 2022.
  • S. Jang, S. Li, and Y. Sung, “FastText-based local feature visualization algorithm for merged image-based malware classification framework for cyber security and cyber defense,” Mathematics, vol. 8, no. 3, p. 460, 2020.
  • Y. Qiao, Q. Jiang, Z. Jiang, and L. Gu, “A multi-channel visualization method for malware classification based on deep learning,” in Proc. IEEE Int. Conf. Trust, Secur. Privacy Comput. Commun. (TrustCom), 2019, pp. 757–762.
  • D. L. Vu, T. K. Nguyen, T. V. Nguyen, T. N. Nguyen, F. Massacci, and P. H. Phung, “HIT4Mal: Hybrid image transformation for malware classification,” Trans. Emerg. Telecommun. Technol., vol. 31, no. 11, p. e3789, 2020.
  • D. Vasan, M. Alazab, S. Wassan, H. Naeem, B. Safaei, and Q. Zheng, “IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture,” Comput. Netw., vol. 171, p. 107138, 2020.
  • R. U. Khan, X. Zhang, and R. Kumar, “Analysis of ResNet and GoogLeNet models for malware detection,” J. Comput. Virol. Hack. Tech., vol. 15, no. 1, pp. 29–37, 2019.
  • U.-H. Tayyab, F. B. Khan, M. H. Durad, A. Khan, and Y. S. Lee, “A survey of the recent trends in deep learning based malware detection,” J. Cybersecur. Priv., vol. 2, no. 4, pp. 800–829, 2022.
  • O. Katar and Ö. Yıldırım, “Classification of malware images using fine-tuned ViT,” Sakarya Univ. J. Comput. Inf. Sci., vol. 7, no. 1, pp. 22–35, 2024.
  • A. Hosna, E. Merry, J. Gyalmo, Z. Alom, Z. Aung, and M. A. Azim, “Transfer learning: A friendly introduction,” J. Big Data, vol. 9, no. 1, p. 102, 2022.
  • A. Ait Nasser and M. A. Akhloufi, “A review of recent advances in deep learning models for chest disease detection using radiography,” Diagnostics, vol. 13, no. 1, p. 159, 2023.
  • B. Koonce, “ResNet-50,” in Convolutional Neural Networks with Swift for TensorFlow: Image Recognition and Dataset Categorization. Berkeley, CA, USA: Apress, 2021, pp. 63–72.
  • B. Koonce, “EfficientNet,” in Convolutional Neural Networks with Swift for TensorFlow: Image Recognition and Dataset Categorization. Berkeley, CA, USA: Apress, 2021, pp. 109–123.
  • H. Garg, B. Sharma, S. Shekhar, and R. Agarwal, “Spoofing detection system for e-health digital twin using EfficientNet convolutional neural network,” Multimedia Tools Appl., vol. 81, no. 19, pp. 26873–26888, 2022.
  • J. Hemalatha, S. A. Roseline, S. Geetha, S. Kadry, and R. Damaševičius, “An efficient DenseNet-based deep learning model for malware detection,” Entropy, vol. 23, no. 3, p. 344, 2021.
  • H. A. Sanghvi, R. H. Patel, A. Agarwal, S. Gupta, V. Sawhney, and A. S. Pandya, “A deep learning approach for classification of COVID and pneumonia using DenseNet-201,” Int. J. Imaging Syst. Technol., vol. 33, no. 1, pp. 18–38, 2023.
  • T. Tuncer, F. Ertam, and S. Doğan, “Automated malware recognition method based on local neighborhood binary pattern,” Multimedia Tools Appl., vol. 79, no. 37, pp. 27815–27832, 2020.
  • T. Tuncer, F. Ertam, and S. Doğan, “Automated malware identification method using image descriptors and singular value decomposition,” Multimedia Tools Appl., vol. 80, no. 7, pp. 10881–10900, 2021.

A Hybrid Deep Learning Approach for Image-based Malware Classification

Yıl 2026, Cilt: 5 Sayı: 1, 26 - 43, 28.02.2026
https://doi.org/10.62520/fujece.1582676
https://izlik.org/JA58XJ69UK

Öz

The diversity and sophistication of malicious content has significantly impacted end-users of Information and Communication Technologies. In order to mitigate the impact of malicious content, automated deep learning-based techniques have been developed to proactively defend user systems against malware. In this study, we implement a hybrid model for malware detection and classification using the MaleVis dataset. First, feature extraction from the dataset is performed using DenseNet-121, EfficientNet-B0 and ResNet-50 models. These models are deep learning architectures that have been trained on large datasets and are known for their powerful feature extraction capabilities. Each model was used to extract feature vectors from the images in the Malevis dataset. These feature vectors were then merged. The combined feature vectors were used for classification using XGBoost, a powerful classification algorithm. This hybrid model approach combines the feature extraction capabilities of deep learning models with the classification capability of XGBoost to detect malware. Experimental results show that the proposed hybrid model achieves high accuracy rates on the MaleVis dataset. The study shows that combining the feature extraction capabilities of different deep learning models and using these features with a classifier such as XGBoost can provide significant improvements in malware detection and classification.The results demonstrate the model’s potential for integration into real-world threat detection systems.

Etik Beyan

Ethics committee permission is not required for the prepared article. There is no conflict of interest with any person/institution in the prepared article.

Destekleyen Kurum

(TUBITAK) with project number 122E337.

Teşekkür

This paper is supported by Fırat University Scientific Research Projects Coordination Unit (FUBAP) with project number TEKF 24.27 and Scientific and Technological Research Council of Turkey (TUBITAK) with project number 122E337. Also, the authors sincerely thank the editor(s) and the anonymous reviewers contributed positively to this paper’s academic development with their constructive and quick feedback.

Kaynakça

  • A. Di Nicola, “Towards digital organized crime and digital sociology of organized crime,” Trends Organ. Crime, pp. 1–20, 2022.
  • Y. Zhang, Y. Xiao, K. Ghaboosi, J. Zhang, and H. Deng, “A survey of cyber crimes,” Secur. Commun. Netw., vol. 5, no. 4, pp. 422–437, 2012.
  • A. Chakraborty, A. Biswas, and A. K. Khan, “Artificial intelligence for cybersecurity: Threats, attacks and mitigation,” in Artificial Intelligence for Societal Issues. Cham, Switzerland: Springer, 2023, pp. 3–25.
  • Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions,” Electron., vol. 12, no. 6, p. 1333, 2023.
  • E. M. Rudd, A. Rozsa, M. Günther, and T. E. Boult, “A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions,” IEEE Commun. Surv. Tutor., vol. 19, no. 2, pp. 1145–1172, 2016.
  • S. S. Chakkaravarthy, D. Sangeetha, and V. Vaidehi, “A survey on malware analysis and mitigation techniques,” Comput. Sci. Rev., vol. 32, pp. 1–23, 2019.
  • J. G. Heiser, “Understanding today’s malware,” Inf. Secur. Tech. Rep., vol. 9, no. 2, pp. 47–64, 2004.
  • F. A. Aboaoja, A. Zainal, F. A. Ghaleb, B. A. S. Al-Rimy, T. A. E. Eisa, and A. A. H. Elnour, “Malware detection issues, challenges, and future directions: A survey,” Appl. Sci., vol. 12, no. 17, p. 8482, 2022.
  • M. I. Malik, A. Ibrahim, P. Hannay, and L. F. Sikos, “Developing resilient cyber-physical systems: A review of state-of-the-art malware detection approaches, gaps, and future directions,” Computers, vol. 12, no. 4, p. 79, 2023.
  • A. Thakkar and R. Lohiya, “A review on machine learning and deep learning perspectives of IDS for IoT: Recent updates, security issues, and challenges,” Arch. Comput. Methods Eng., vol. 28, no. 4, pp. 3211–3243, 2021.
  • Z. Chen et al., “Machine learning-enabled IoT security: Open issues and challenges under advanced persistent threats,” ACM Comput. Surv., vol. 55, no. 5, pp. 1–37, 2022.
  • L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath, “Malware images: Visualization and automatic classification,” in Proc. 8th Int. Symp. Visualization Cyber Secur., 2011, pp. 1–7.
  • M. Goyal and R. Kumar, “IVMCT: Image visualization based multiclass malware classification using transfer learning,” Math. Stat. Eng. Appl., vol. 71, no. 2, pp. 42–50, 2022.
  • S. Jang, S. Li, and Y. Sung, “FastText-based local feature visualization algorithm for merged image-based malware classification framework for cyber security and cyber defense,” Mathematics, vol. 8, no. 3, p. 460, 2020.
  • Y. Qiao, Q. Jiang, Z. Jiang, and L. Gu, “A multi-channel visualization method for malware classification based on deep learning,” in Proc. IEEE Int. Conf. Trust, Secur. Privacy Comput. Commun. (TrustCom), 2019, pp. 757–762.
  • D. L. Vu, T. K. Nguyen, T. V. Nguyen, T. N. Nguyen, F. Massacci, and P. H. Phung, “HIT4Mal: Hybrid image transformation for malware classification,” Trans. Emerg. Telecommun. Technol., vol. 31, no. 11, p. e3789, 2020.
  • D. Vasan, M. Alazab, S. Wassan, H. Naeem, B. Safaei, and Q. Zheng, “IMCFN: Image-based malware classification using fine-tuned convolutional neural network architecture,” Comput. Netw., vol. 171, p. 107138, 2020.
  • R. U. Khan, X. Zhang, and R. Kumar, “Analysis of ResNet and GoogLeNet models for malware detection,” J. Comput. Virol. Hack. Tech., vol. 15, no. 1, pp. 29–37, 2019.
  • U.-H. Tayyab, F. B. Khan, M. H. Durad, A. Khan, and Y. S. Lee, “A survey of the recent trends in deep learning based malware detection,” J. Cybersecur. Priv., vol. 2, no. 4, pp. 800–829, 2022.
  • O. Katar and Ö. Yıldırım, “Classification of malware images using fine-tuned ViT,” Sakarya Univ. J. Comput. Inf. Sci., vol. 7, no. 1, pp. 22–35, 2024.
  • A. Hosna, E. Merry, J. Gyalmo, Z. Alom, Z. Aung, and M. A. Azim, “Transfer learning: A friendly introduction,” J. Big Data, vol. 9, no. 1, p. 102, 2022.
  • A. Ait Nasser and M. A. Akhloufi, “A review of recent advances in deep learning models for chest disease detection using radiography,” Diagnostics, vol. 13, no. 1, p. 159, 2023.
  • B. Koonce, “ResNet-50,” in Convolutional Neural Networks with Swift for TensorFlow: Image Recognition and Dataset Categorization. Berkeley, CA, USA: Apress, 2021, pp. 63–72.
  • B. Koonce, “EfficientNet,” in Convolutional Neural Networks with Swift for TensorFlow: Image Recognition and Dataset Categorization. Berkeley, CA, USA: Apress, 2021, pp. 109–123.
  • H. Garg, B. Sharma, S. Shekhar, and R. Agarwal, “Spoofing detection system for e-health digital twin using EfficientNet convolutional neural network,” Multimedia Tools Appl., vol. 81, no. 19, pp. 26873–26888, 2022.
  • J. Hemalatha, S. A. Roseline, S. Geetha, S. Kadry, and R. Damaševičius, “An efficient DenseNet-based deep learning model for malware detection,” Entropy, vol. 23, no. 3, p. 344, 2021.
  • H. A. Sanghvi, R. H. Patel, A. Agarwal, S. Gupta, V. Sawhney, and A. S. Pandya, “A deep learning approach for classification of COVID and pneumonia using DenseNet-201,” Int. J. Imaging Syst. Technol., vol. 33, no. 1, pp. 18–38, 2023.
  • T. Tuncer, F. Ertam, and S. Doğan, “Automated malware recognition method based on local neighborhood binary pattern,” Multimedia Tools Appl., vol. 79, no. 37, pp. 27815–27832, 2020.
  • T. Tuncer, F. Ertam, and S. Doğan, “Automated malware identification method using image descriptors and singular value decomposition,” Multimedia Tools Appl., vol. 80, no. 7, pp. 10881–10900, 2021.
Toplam 29 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Yazılım Mühendisliği (Diğer)
Bölüm Araştırma Makalesi
Yazarlar

Zülfiye Beyza Metin 0000-0003-4376-7319

Fatih Özkaynak 0000-0003-1292-8490

Gönderilme Tarihi 10 Kasım 2024
Kabul Tarihi 9 Ağustos 2025
Yayımlanma Tarihi 28 Şubat 2026
DOI https://doi.org/10.62520/fujece.1582676
IZ https://izlik.org/JA58XJ69UK
Yayımlandığı Sayı Yıl 2026 Cilt: 5 Sayı: 1

Kaynak Göster

APA Metin, Z. B., & Özkaynak, F. (2026). A Hybrid Deep Learning Approach for Image-based Malware Classification. Firat University Journal of Experimental and Computational Engineering, 5(1), 26-43. https://doi.org/10.62520/fujece.1582676
AMA 1.Metin ZB, Özkaynak F. A Hybrid Deep Learning Approach for Image-based Malware Classification. Firat University Journal of Experimental and Computational Engineering. 2026;5(1):26-43. doi:10.62520/fujece.1582676
Chicago Metin, Zülfiye Beyza, ve Fatih Özkaynak. 2026. “A Hybrid Deep Learning Approach for Image-based Malware Classification”. Firat University Journal of Experimental and Computational Engineering 5 (1): 26-43. https://doi.org/10.62520/fujece.1582676.
EndNote Metin ZB, Özkaynak F (01 Şubat 2026) A Hybrid Deep Learning Approach for Image-based Malware Classification. Firat University Journal of Experimental and Computational Engineering 5 1 26–43.
IEEE [1]Z. B. Metin ve F. Özkaynak, “A Hybrid Deep Learning Approach for Image-based Malware Classification”, Firat University Journal of Experimental and Computational Engineering, c. 5, sy 1, ss. 26–43, Şub. 2026, doi: 10.62520/fujece.1582676.
ISNAD Metin, Zülfiye Beyza - Özkaynak, Fatih. “A Hybrid Deep Learning Approach for Image-based Malware Classification”. Firat University Journal of Experimental and Computational Engineering 5/1 (01 Şubat 2026): 26-43. https://doi.org/10.62520/fujece.1582676.
JAMA 1.Metin ZB, Özkaynak F. A Hybrid Deep Learning Approach for Image-based Malware Classification. Firat University Journal of Experimental and Computational Engineering. 2026;5:26–43.
MLA Metin, Zülfiye Beyza, ve Fatih Özkaynak. “A Hybrid Deep Learning Approach for Image-based Malware Classification”. Firat University Journal of Experimental and Computational Engineering, c. 5, sy 1, Şubat 2026, ss. 26-43, doi:10.62520/fujece.1582676.
Vancouver 1.Zülfiye Beyza Metin, Fatih Özkaynak. A Hybrid Deep Learning Approach for Image-based Malware Classification. Firat University Journal of Experimental and Computational Engineering. 01 Şubat 2026;5(1):26-43. doi:10.62520/fujece.1582676