Basit öğe kaydını göster

dc.contributor.authorÇatak, Ferhat Özgür
dc.contributor.authorAhmed, Javed
dc.contributor.authorŞahinbaş, Kevser
dc.contributor.authorKhand, Zahid Hussain
dc.date.accessioned2021-02-26T08:02:42Z
dc.date.available2021-02-26T08:02:42Z
dc.date.issued2021en_US
dc.identifier.citationÇatak, F. Ö., Ahmed, J., Şahinbaş, K. ve Khand, Z. H. (2021). Data augmentation based malware detection using convolutional neural networks. PeerJ Computer Science, 7, 1-26. https://dx.doi.org/10.7717/PEERJ-CS.346en_US
dc.identifier.issn2376-5992
dc.identifier.urihttps://dx.doi.org/10.7717/PEERJ-CS.346
dc.identifier.urihttps://hdl.handle.net/20.500.12511/6585
dc.description.abstractDue to advancements in malware competencies, cyber-attacks have been broadly observed in the digital world. Cyber-attacks can hit an organization hard by causing several damages such as data breach, financial loss, and reputation loss. Some of the most prominent examples of ransomware attacks in history are WannaCry and Petya, which impacted companies’ finances throughout the globe. Both WannaCry and Petya caused operational processes inoperable by targeting critical infrastructure. It is quite impossible for anti-virus applications using traditional signature-based methods to detect this type of malware because they have different characteristics on each contaminated computer. The most important feature of this type of malware is that they change their contents using their mutation engines to create another hash representation of the executable file as they propagate from one computer to another. To overcome this method that attackers use to camouflage malware, we have created three-channel image files of malicious software. Attackers make different variants of the same software because they modify the contents of the malware. In the solution to this problem, we created variants of the images by applying data augmentationmethods. This article aims to provide an image augmentation enhanced deep convolutional neural network (CNN) models for detecting malware families in a metamorphic malware environment. The main contributions of the article consist of three components, including image generation from malware samples, image augmentation, and the last one is classifying the malware families by using a CNN model. In the first component, the collected malware samples are converted into binary file to 3-channel images using the windowing technique. The second component of the system create the augmented version of the images, and the last part builds a classification model. This study uses five different deep CNNmodel formalware family detection. The results obtained by the classifier demonstrate accuracy up to 98%, which is quite satisfactory.en_US
dc.language.isoengen_US
dc.publisherPeerJ Inc.en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution 4.0 International*
dc.rights.urihttps://www.creativecommons.org/licenses/by/4.0/*
dc.subjectConvolutional Neural Networksen_US
dc.subjectCybersecurityen_US
dc.subjectImage Augmentationen_US
dc.subjectMalware Analysisen_US
dc.titleData augmentation based malware detection using convolutional neural networksen_US
dc.typearticleen_US
dc.relation.ispartofPeerJ Computer Scienceen_US
dc.departmentİstanbul Medipol Üniversitesi, İşletme ve Yönetim Bilimleri Fakültesi, Yönetim Bilişim Sistemleri Bölümüen_US
dc.identifier.volume7en_US
dc.identifier.startpage1en_US
dc.identifier.endpage26en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.7717/PEERJ-CS.346en_US
dc.identifier.wosqualityQ3en_US
dc.identifier.scopusqualityQ2en_US


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster

info:eu-repo/semantics/openAccess
Aksi belirtilmediği sürece bu öğenin lisansı: info:eu-repo/semantics/openAccess