Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/4579
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRajneekant, .-
dc.contributor.authorKishore, Pushkar-
dc.contributor.authorGond, Bishwajit Prasad-
dc.contributor.authorMohapatra, Durga Prasad-
dc.date.accessioned2024-05-28T13:26:35Z-
dc.date.available2024-05-28T13:26:35Z-
dc.date.issued2024-05-
dc.identifier.citationInternational Conference on Innovations and Advances in Cognitive Systems(ICIACS), Builders Engineering College, Kangayam, Tamil Nadu, India, 27-28 May 2024en_US
dc.identifier.urihttp://hdl.handle.net/2080/4579-
dc.descriptionCopyright belongs to proceeding publisheren_US
dc.description.abstractThe exponential rise in malware is a significant threat to the current hosts and it necessitates robust detection and classification mechanisms. Traditional analysis methods like static and dynamic analysis do not successfully identify malware due to evasion techniques. Dynamic techniques can uncover behavior-hiding malware but require a sophisticated malware detector. Current malware detectors use API sequences for detection but overlook the significance of API arguments. To address the limitations, we propose using Levenshtein distance for evaluating the embedding of API calls and thereby enhancing the feature representation. Later, we construct a graphical network from API embeddings and an appropriate graph neural network model is proposed to derive patterns from the provided graphical structures. The proposed malware detector/classifier achieves 99.59% malware detection Matthews Correlation Coefficient score and 74.39% malware classification Matthews Correlation Coefficient score. Overall, the proposed model aims to help understand malware behaviors, improve API call embedding, and detectstealthy malicious samples.en_US
dc.subjectMalicious samplesen_US
dc.subjectAPI call argumentsen_US
dc.subjectAPI call embeddingen_US
dc.subjectGraph neural networken_US
dc.titleMalware Detector and Classifier using API Call Embedding and Graph Neural Networksen_US
dc.typeArticleen_US
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
2024_ICIACS_Rajnikant_Malware.pdf332.01 kBAdobe PDFView/Open    Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.