Abstract
The cybercrime industry is increasingly evolving. The cost of cybercrime showed up as the third largest economy after the USA and China. Malware is considered one of the biggest threats that the world faces. The rapid evolution in the malware industry should be met with new detection models that are able to understand the malicious process. This paper proposes an approach that identifies malicious processes based on visualising their progressive execution. Moreover, formulating a heuristic function that identifies malicious mimicry processes that can fake antivirus by showing up as benign or normal processes Our proposed model showed a comparative accuracy score compared to other peer approaches.
Original language | English |
---|---|
Title of host publication | 1st International Conference of Intelligent Methods, Systems and Applications, IMSA 2023 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 99-104 |
Number of pages | 6 |
ISBN (Electronic) | 9798350335569 |
ISBN (Print) | 9798350335576 |
DOIs | |
Publication status | Published - 24 Aug 2023 |
Event | 1st International Conference of Intelligent Methods, Systems and Applications, IMSA 2023 - Giza, Egypt Duration: 15 Jul 2023 → 16 Jul 2023 |
Conference
Conference | 1st International Conference of Intelligent Methods, Systems and Applications, IMSA 2023 |
---|---|
Country/Territory | Egypt |
City | Giza |
Period | 15/07/23 → 16/07/23 |
Keywords
- API call sequence
- dynamic analysis
- Malware detection
- Malware Mimicry