Skip to content

A novel malware detection system based on machine learning and binary visualization

Research output: Chapter in Book/Report/Conference proceedingConference contribution

The continued evolution and diversity of malware constitutes a major threat in modern systems. It is well proven that security defenses currently available are ineffective to mitigate the skills and imagination of cyber-criminals necessitating the development of novel solutions. Deep learning algorithms and artificial intelligence (AI) are rapidly evolving with remarkable results in many application areas. Following the advances of AI and recognizing the need for efficient malware detection methods, this paper presents a new approach for malware detection based on binary visualization and self-organizing incremental neural networks. The proposed method's performance in detecting malicious payloads in various file types was investigated and the experimental results showed that a detection accuracy of 91.7% and 94.1% was achieved for ransomware in.pdf and.doc files respectively. With respect to other formats of malicious code and other file types, including binaries, the proposed method behaved well with an incremental detection rate that allows efficiently detecting unknown malware at real-time.

Original languageEnglish
Title of host publication2019 IEEE International Conference on Communications Workshops, ICC Workshops 2019 - Proceedings
Number of pages6
ISBN (Electronic)978-1-7281-2373-8, 978-1-7281-2372-1
ISBN (Print)978-1-7281-2374-5
Publication statusPublished - 11 Jul 2019
Event2019 IEEE International Conference on Communications Workshops - Shanghai, China
Duration: 20 May 201924 May 2019

Publication series

Name2019 IEEE International Conference on Communications Workshops, ICC Workshops 2019 - Proceedings
ISSN (Print)2474-9133
ISSN (Electronic)2474-9133


Workshop2019 IEEE International Conference on Communications Workshops
OtherICC Workshops 2019


  • 1904.00859

    Rights statement: © © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

    Accepted author manuscript (Post-print), 1.58 MB, PDF document

Related information

Relations Get citation (various referencing formats)

ID: 15934739