Explore chapters and articles related to this topic
Malware Detection and Mitigation
Published in Nicholas Kolokotronis, Stavros Shiaeles, Cyber-Security Threats, Actors, and Dynamic Mitigation, 2021
Gueltoum Bendiab, Stavros Shiaeles, Nick Savage
Process Explorer10 is famous free tool developed by Microsoft. This tool can be used for performing dynamic malware analysis. Process Explorer is used for monitoring the running processes and shows the handles and DLLs that are running and loaded for each process. This tool is an excellent replacement for Task Manager, especially for Windows OS up to and including Windows 7. In addition to the regular options offered by Task Manager, Process Explorer has extra ones that are very helpful for analyzing suspicious infected systems. For instance, Process Explorer allows malware analysts to check the running processes and loaded DLLs on the online malware repository VirusTotal11.
Cyber Defence and Countermeasures
Published in Stanislav Abaimov, Maurizio Martellini, Cyber Arms, 2020
Stanislav Abaimov, Maurizio Martellini
Anti-virus programs are not always effective against new viruses, especially in the CBRNe environment, where low-power devices do not allow additional software (such as antiviruses) to be easily deployed. The malware developers test their new malware using the major antivirus applications available and online services, some of which are available for free. For example, new strains of malware are often discovered by online malware analysis websites (such as VirusTotal) when the malware developers test it for detectability.
Machine Learning – Supervised Learning
Published in Rakesh M. Verma, David J. Marchette, Cybersecurity Analytics, 2019
Rakesh M. Verma, David J. Marchette
The data set problem for malware is less acute than for intrusions. There are several sources of malware data sets such as VirusTotal, VirusShare (over 30 million malware samples), etc. We include a subset of the available malware data sets in Table 6.6 [147].
Scalable Malware Detection System Using Distributed Deep Learning
Published in Cybernetics and Systems, 2023
We gathered malware datasets from different sources. VirsusShare provided 7825 Malware samples, while VirusTotal and theZoo provided 8127. These samples contain malware from various families. The IEEE data repository’s malware analysis datasets were also used in the analysis. There are approximately 1000 portable executable (PE) headers in it (Angelo 2019). Contagio, Malwr, and Lenny Zelter malware repositories also yielded some malware samples. Office Utility Software, Network Tools, Gaming Applications, Image Editing Software, Adobe Reader, Media Player, and other application and utility software were used to collect 2128 benign files.
Assessment of supervised machine learning algorithms using dynamic API calls for malware detection
Published in International Journal of Computers and Applications, 2022
Malware samples were collected from many repositories such as VirusShare, malware, Contagio, and VirusTotal. Some live malware samples were captured using Dionaea Honeypot. Malware samples consist of worms, viruses, Trojan horses, adware, and spyware. Like other proposed technique in which malware samples from old repository VxHeaven are not collected, benign files were collected from Windows operating systems: Windows 7, 10, and XP-SP3. Also, various benign were collected from application software such as Word processors, Adobe Readers, Browsers, Audio and Videos player, Development Frameworks, etc.
Big Data Framework for Zero-Day Malware Detection
Published in Cybernetics and Systems, 2018
The proposed framework for malware detection is evaluated on a dataset of 0.2 million files including 0.05 million clean files and 0.15 million malware samples targeting Windows operating system. The malware samples used in our dataset are collected from diverse sources like VX Heaven (www.vxheaven.org), Nothink (www.nothink.org), VirusShare (www.virusshare.com), etc. The number of malware samples submitted to VirusTotal for analysis during the years 2010–2016 are shown in Figure 2.