Research Article

Malware Visualization Techniques

Volume: 8 Number: 1 March 31, 2020
EN

Malware Visualization Techniques

Abstract

Malware basically means malicious software that can be an intrusive program code or anything that is designed to perform malicious operations on system and executes malicious actions such as clandestine, listening, monitoring, saving, and deleting without the user's knowledge and consent. Malware review and analysis requires an advanced level of programming knowledge, in-depth file systems knowledge, deep code inspection, and reverse engineering capability. New techniques are needed to reduce indirect costs of malware analysis. This paper aims to provide insights into the malware visualization techniques and its applications, most common malware types and the extracted features that used to identify the malware are demonstrated in this study. In this work, Systematic Literature Review (SLR) conducted to investigate the current state of knowledge about Malware detection techniques, data visualization and malware features. An advanced research has been carried out in most relevant digital libraries for potential published articles. 90 preliminary studies (PS) were determined on the basis of inclusion and exclusion criteria. The analytical study is based mainly on the PSs to achieve the goals. The results clarify the importance of visualization techniques and which are the most common malware as well as the most useful features. Several ways to visualize malware to help malware analysts have been suggested.

Keywords

References

  1. Zhang, Y., et al., A survey of cyber crimes. Security and Communication Networks, 2012. 5(4): p. 422-437.
  2. Bazrafshan, Z., et al. A survey on heuristic malware detection techniques. in The 5th Conference on Information and Knowledge Technology. 2013.
  3. La Polla, M., F. Martinelli, and D. Sgandurra, A Survey on Security for Mobile Devices. IEEE Communications Surveys & Tutorials, 2013. 15(1): p. 446-471.
  4. Meng, G., et al., Mystique: Evolving Android Malware for Auditing Anti-Malware Tools, in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. 2016, ACM: Xi'an, China. p. 365-376.
  5. Vemparala, S., et al., Malware Detection Using Dynamic Birthmarks, in Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics. 2016, ACM: New Orleans, Louisiana, USA. p. 41-46.
  6. Dang-Pham, D. and S. Pittayachawan, Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. Computers & Security, 2015. 48: p. 281-297.
  7. Meng, G., et al., Semantic modelling of Android malware for effective malware comprehension, detection, and classification, in Proceedings of the 25th International Symposium on Software Testing and Analysis. 2016, ACM: Saarbrücken, Germany. p. 306-317.
  8. Han, K., J.H. Lim, and E.G. Im, Malware analysis method using visualization of binary files, in Proceedings of the 2013 Research in Adaptive and Convergent Systems. 2013, ACM: Montreal, Quebec, Canada. p. 317-321.

Details

Primary Language

English

Subjects

Engineering

Journal Section

Research Article

Publication Date

March 31, 2020

Submission Date

February 13, 2019

Acceptance Date

February 13, 2020

Published in Issue

Year 2020 Volume: 8 Number: 1

APA
Efe, A., & Hussin, S. H. S. (2020). Malware Visualization Techniques. International Journal of Applied Mathematics Electronics and Computers, 8(1), 7-20. https://doi.org/10.18100/ijamec.526813
AMA
1.Efe A, Hussin SHS. Malware Visualization Techniques. International Journal of Applied Mathematics Electronics and Computers. 2020;8(1):7-20. doi:10.18100/ijamec.526813
Chicago
Efe, Ahmet, and Saleh Hussin S. Hussin. 2020. “Malware Visualization Techniques”. International Journal of Applied Mathematics Electronics and Computers 8 (1): 7-20. https://doi.org/10.18100/ijamec.526813.
EndNote
Efe A, Hussin SHS (March 1, 2020) Malware Visualization Techniques. International Journal of Applied Mathematics Electronics and Computers 8 1 7–20.
IEEE
[1]A. Efe and S. H. S. Hussin, “Malware Visualization Techniques”, International Journal of Applied Mathematics Electronics and Computers, vol. 8, no. 1, pp. 7–20, Mar. 2020, doi: 10.18100/ijamec.526813.
ISNAD
Efe, Ahmet - Hussin, Saleh Hussin S. “Malware Visualization Techniques”. International Journal of Applied Mathematics Electronics and Computers 8/1 (March 1, 2020): 7-20. https://doi.org/10.18100/ijamec.526813.
JAMA
1.Efe A, Hussin SHS. Malware Visualization Techniques. International Journal of Applied Mathematics Electronics and Computers. 2020;8:7–20.
MLA
Efe, Ahmet, and Saleh Hussin S. Hussin. “Malware Visualization Techniques”. International Journal of Applied Mathematics Electronics and Computers, vol. 8, no. 1, Mar. 2020, pp. 7-20, doi:10.18100/ijamec.526813.
Vancouver
1.Ahmet Efe, Saleh Hussin S. Hussin. Malware Visualization Techniques. International Journal of Applied Mathematics Electronics and Computers. 2020 Mar. 1;8(1):7-20. doi:10.18100/ijamec.526813

Cited By