Noble Feature Extraction of Malware from Contents of File
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2017 by IJCTT Journal|
|Year of Publication : 2017|
|Authors : Hemant J. Chaudhari, Prof. M. S. Mahindrakar|
|DOI : 10.14445/22312803/IJCTT-V48P135|
Hemant J. Chaudhari, Prof. M. S. Mahindrakar "Noble Feature Extraction of Malware from Contents of File". International Journal of Computer Trends and Technology (IJCTT) V48(4):192-195, June 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Malware family identification is a critical process involving extraction of distinctive property from a set of malware samples. Now a day several malware authors use various techniques to prevent the identification of unique property of their programs, such as, encryption and obfuscation. In this paper, we present features extraction of malware from contents of the file. First of all we scanning sample dataset or executable file through the virus total online tool then disassemble given file by using IDA pro tool; Convert given file into N-gram sequential pattern by using KfNgram tool; Measurement of used symbols, sections, metadata and finally calculate the entropy. Our goal in this research is to introduce a noble set of features to understood malware features.
 IDA-Pro tool, available at http:// www.hex-rays.com
 KfNgram tool available at http://www.kwicfinder.com/kfNgram
 HxD Tool, available at https://mhnexus.de/en/downloads.php?product =HxD
 Virus-Total online tool available at, https://www.virustotal.com
 Hex-to-text Converter online tool, available at http://www.rapidtables.com/convert/number/ hex-to-ascii.html
 Count number of lines online tool, available at https://www.tools4noobs.com/onlinetools
 VXheavens Website for Datasets http://vx.netlux.org
 Chatchai Liangboonprakong Ohm Sornil, Bangkok, Thailand Classification of Malware Families Based on N-grams Sequential Pattern Features IEEE 2013.
 Mansour Ahmadi Dmitry Ulyanov, University of Cagliari, Italy Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification CODASPY 16, March 09-11, 2016, New Orleans, LA, USA.
 Smita Ranveer Swapnaja Hiray,Sinhgad College of Engineering, Pune Comparative Analysis of Feature Extraction, Methods of Malware Detection International Journal of Computer Applications (0975 8887) Volume 120 No. 5, June 2015.
 ROBERT LYDA, Sparta JAMES HAMROCK, McDonald Bradley Using Entropy Analysis to Find Encrypted and Packed Malware in 1540-7993/07 2007 IEEE SECURITY PRIVACY.
Feature Extraction of Malware, N-gram, Sequential pattern, Malware features, Set of attributes, Metadata, Malicious Symbols, Sections, Entropy.