Login / Signup

An Insight into the Machine-Learning-Based Fileless Malware Detection.

Osama KhalidSubhan UllahTahir AhmadSaqib SaeedDina A AlabbadMudassar AslamAttaullah BuriroRizwan Ahmad
Published in: Sensors (Basel, Switzerland) (2023)
In recent years, massive development in the malware industry changed the entire landscape for malware development. Therefore, cybercriminals became more sophisticated by advancing their development techniques from file-based to fileless malware. As file-based malware depends on files to spread itself, on the other hand, fileless malware does not require a traditional file system and uses benign processes to carry out its malicious intent. Therefore, it evades conventional detection techniques and remains stealthy. This paper briefly explains fileless malware, its life cycle, and its infection chain. Moreover, it proposes a detection technique based on feature analysis using machine learning for fileless malware detection. The virtual machine acquired the memory dumps upon executing the malicious and non-malicious samples. Then the necessary features are extracted using the Volatility memory forensics tool, which is then analyzed using machine learning classification algorithms. After that, the best algorithm is selected based on the k-fold cross-validation score. Experimental evaluation has shown that Random Forest outperforms other machine learning classifiers (Decision Tree, Support Vector Machine, Logistic Regression, K-Nearest Neighbor, XGBoost, and Gradient Boosting). It achieved an overall accuracy of 93.33% with a True Positive Rate (TPR) of 87.5% at zeroFalse Positive Rate (FPR) for fileless malware collected from five widely used datasets (VirusShare, AnyRun, PolySwarm, HatchingTriage, and JoESadbox).
Keyphrases
  • machine learning
  • deep learning
  • loop mediated isothermal amplification
  • artificial intelligence
  • label free
  • real time pcr
  • big data
  • life cycle
  • working memory
  • climate change
  • single cell
  • quantum dots
  • rna seq