Open Research Newcastle
Browse

Malytics: a malware detection scheme

Download (7.01 MB)
journal contribution
posted on 2025-05-10, 14:55 authored by Mahmood Yousefi-Azar, Leonard G. C. Hamey, Vijayaraghavan VaradharajanVijayaraghavan Varadharajan, Shiping Chen
An important problem of cyber-security is malware analysis. Besides good precision and recognition rate, ideally, a malware detection scheme needs to be able to generalize well for novel malware families (a.k.a zero-day attacks). It is important that the system does not require excessive computation particularly for deployment on the mobile devices. In this paper, we propose a novel scheme to detect malware which we call Malytics. It is not dependent on any particular tool or operating system. It extracts static features of any given binary file to distinguish malware from benign. Malytics consists of three stages: feature extraction, similarity measurement and classification. The three phases are implemented by a neural network with two hidden layers and an output layer. We show feature extraction, which is performed by tf-simhashing, is equivalent to the first layer of a particular neural network. We evaluate Malytics performance on both Android and Windows platforms. Malytics outperforms a wide range of learning-based techniques and also individual state-of-the-art models on both platforms. We also show Malytics is resilient and robust in addressing zero-day malware samples. The F1-score of Malytics is 97:21% and 99:45% on Android dex file and Windows PE files respectively, in the applied datasets. The speed and efficiency of Malytics are also evaluated.

History

Journal title

IEEE Access

Volume

6

Pagination

49418-49431

Publisher

Institute of Electrical and Electronics Engineers (IEEE)

Language

  • en, English

College/Research Centre

Faculty of Engineering and Built Environment

School

Advanced Cyber Security Engineering Research Centre

Rights statement

© 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission

Usage metrics

    Publications

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC