IEEE Con Temp FIN
IEEE Con Temp FIN
Learning
Basil Abdulrahman Abdulrahman Qanadeely Abdulaziz Al-Hassan
Dept. of Networks and Dept. of Networks and Dept. of Networks and
Communications Communications Communications
Imam Abdulrahman Bin Faisal Imam Abdulrahman Bin Faisal Imam Abdulrahman Bin Faisal
University University University
Dammam, Saudi Arabia Dammam, Saudi Arabia Dammam, Saudi Arabia
[email protected] [email protected] [email protected]
Abstract— MalScanner is a tool that aims to provide a simple, user survey of professionals and participants from the
effective, and user-friendly method of scanning files for malicious academic community. Around 92% of survey participants
behavior. Furthermore, MalScanner scans a file and extracts gave positive feedback on the usability of this model. As seen
features to be used in machine learning assisted static malware in the figure below, users from multiple devices can send their
analysis and inspects the file’s behavior dynamically. This tool malware to the server for analysis and receive results.
also implements a blockchain database to store analysis results.
The solution will be presented to the user in a straightforward
manner via web application.
I. INTRODUCTION
While the methods used by attackers to create, pack, and
disseminate malicious software greatly evolved over the
years; the advancements in malware detection and threat
assessment methods used by security researchers are lacking Fig. 1. Cuckoo Sandbox Architecture.
compared to advanced persistent threats. Current detection
methods can be summarized as the following: signature- In [3], Cuckoo sandbox is used to conduct dynamic
based, behavioral-based, and heuristic-based. While the latter malware analysis. The information extracted from file
two of the priorly mentioned methods are the most effective analysis includes registry changes, file changes, API calls,
and accurate, signature-based detection is the most common network traffic, and summary information. Different
method of detection used by commercial security products [1]. combinations of this information can be used to detect
Moreover, many innovations have been made in the machine malicious behaviour. Based on an experiment using 800
learning field. Which is why we thought of integrating ML in ordinary and 2200 malware files, features are extracted with
cyber security practices, to elevate accuracy without 94.64% accuracy. Some limitations found from this study
sacrificing security. In particular, the features to be used can include the limited network connectivity that prevent
be reutilized in other endeavors based on their precision in complete analysis of network behaviour of malware, the
distinguishing between malicious and legitimate software. intelligent behaviour of sophisticated malware, and the easy
Windows binary executables of a malicious nature all share detection of virtual environments when running malware. The
similar metadata information that are intentionally forged by figure below shows different combinations used for feature
attackers to provide anonymity. Little do they know; these extraction and API with summary information using Gradient
features could be used to indicate the presence of malicious B Classifier algorithm shows the best AUC at 95.86%.
software. Table I. Extracted Feature Combinations Compared Based on their AUC
Percentage.
II. RELATED WORK
In [2], a user-friendly model for ransomware analysis is Combination Algorithm AUC
developed. The results of the analysis are shown in a report APIs+DLLs AdaBoost 84.60
that is summarized to make it easier for the user to understand. Classifier
The user interface contains only two buttons to upload the file
and submit. The model is built using the Cuckoo open-source APIs+Summary Gradient B. 95.86
sandbox environment for automated malware analysis. The information Classifier
Cuckoo sandbox runs on Linux and can be used to analyse Registry Gradient B. 86.10
PDF, EXE, and DOC files. The files are uploaded to the Classifier
Cuckoo sandbox through REST API. The usability and
accessibility of this model is evaluated using a comprehensive
The second type of users are ones that sign up on the In order to ease the governance of the MalScanner
platform where they will be able to save their files and view platform by the admin, a special admin portal page will be
their scanning history. These users can also upload the created for admins. This page will ease the control of the
suspected files on the platform to check as well as add admin over the platform by containing a simple interface
comments on it for future users to see. Guest users are limited which is easily intelligible and understood. Below is a
to only one functionality which is uploading the files. wireframe demonstrating the admin portal interface.
The following figure showcases and overview of the The main interface provides the user with quick access to
system’s architecture: the functionalities provided by the web application. Below is
a figure displaying a wireframe design of the interface to be
implemented.
[7] C.-H. Lin, H.-K. Pao and J.-W. Liao, "Efficient dynamic malware
analysis using virtual time control mechanics," Computers &
Security, vol. 73, no. 0167-4048, pp. 359-373, 2018.
[18] S. Lad and A. Adamuthe, "Improved Deep Learning Model for Static
PE Files Malware Detection and Classification," I. J. Computer
Network and Information Security, vol. 2, pp. 14-26, 2022.