Identification of malware mimicry attacks using process escalating visualization

Eslam Amer*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The cybercrime industry is increasingly evolving. The cost of cybercrime showed up as the third largest economy after the USA and China. Malware is considered one of the biggest threats that the world faces. The rapid evolution in the malware industry should be met with new detection models that are able to understand the malicious process. This paper proposes an approach that identifies malicious processes based on visualising their progressive execution. Moreover, formulating a heuristic function that identifies malicious mimicry processes that can fake antivirus by showing up as benign or normal processes Our proposed model showed a comparative accuracy score compared to other peer approaches.

Original languageEnglish
Title of host publication1st International Conference of Intelligent Methods, Systems and Applications, IMSA 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages99-104
Number of pages6
ISBN (Electronic)9798350335569
ISBN (Print)9798350335576
DOIs
Publication statusPublished - 24 Aug 2023
Event1st International Conference of Intelligent Methods, Systems and Applications, IMSA 2023 - Giza, Egypt
Duration: 15 Jul 202316 Jul 2023

Conference

Conference1st International Conference of Intelligent Methods, Systems and Applications, IMSA 2023
Country/TerritoryEgypt
CityGiza
Period15/07/2316/07/23

Keywords

  • API call sequence
  • dynamic analysis
  • Malware detection
  • Malware Mimicry

Fingerprint

Dive into the research topics of 'Identification of malware mimicry attacks using process escalating visualization'. Together they form a unique fingerprint.

Cite this