malware analysis using visualized images and entropy
play

Malware analysis using visualized images and entropy graphs Kyoung - PowerPoint PPT Presentation

Malware analysis using visualized images and entropy graphs Kyoung Soo Han Jae Hyun Lim Boojoong Kang Eul Gyu Im Presented by Ruikai Zheng CISC850 Cyber Analytics 1.Introduction Malware variants developed using automated tools


  1. Malware analysis using visualized images and entropy graphs Kyoung Soo Han · Jae Hyun Lim · Boojoong Kang · Eul Gyu Im Presented by Ruikai Zheng CISC850 Cyber Analytics

  2. 1.Introduction Malware variants developed using automated tools • Automated tools reuse modules • Similarities may exist among malware variants •

  3. 2.General Idea

  4. 3. Bitmap Image

  5. Bitmap Image converter

  6. Some examples

  7. 4. Entropy graph

  8. Entropy graph generator For each line of bitmap image: (suppose the image is 256 * 256)

  9. 5. Compute similarities • Align the x-axes(the heights of bitmap images) of the two entropy graphs

  10. Compute similarities • Compute K 1 and K 2 – K 1

  11. Compute similarities • Compute K 1 and K 2 – K 2

  12. Compute similarities • Similarity value

  13. Experiment result

  14. Experiment result

  15. Experiment result • Threshold – False positive rate – False negative rate

  16. Limitation • Malware applied with packing technique – The entropy values of binaries can be very high – Packed malware binaries are difficult to classify

  17. Conclusion The paper proposed a malware visualization method that • using binary grayscale bitmap images and entropy graphs. The paper proposed a method to calculate similarities of • malware to classify malware families. Experimental results showed that proposed method can • classify malware families with a small false-positive/false - negative rate.

  18. Thank you

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend