Binary malware image classification using machine learning with local binary pattern
Title | Binary malware image classification using machine learning with local binary pattern |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Luo, J. S., Lo, D. C. T. |
Conference Name | 2017 IEEE International Conference on Big Data (Big Data) |
Date Published | Dec. 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5386-2715-0 |
Keywords | binary image, binary malware image classification, classification, cyber-security, feature extraction, Human Behavior, image classification, Image color analysis, image descriptors, image texture, invasive software, LBP feature, learning (artificial intelligence), local binary pattern, machine learning, Malware, malware classification, malware classification methodology, malware images, Metrics, pattern classification, privacy, pubcrawl, resilience, Resiliency, Support vector machines, Trojan horses, visualization |
Abstract | Malware classification is a critical part in the cyber-security. Traditional methodologies for the malware classification typically use static analysis and dynamic analysis to identify malware. In this paper, a malware classification methodology based on its binary image and extracting local binary pattern (LBP) features is proposed. First, malware images are reorganized into 3 by 3 grids which is mainly used to extract LBP feature. Second, the LBP is implemented on the malware images to extract features in that it is useful in pattern or texture classification. Finally, Tensorflow, a library for machine learning, is applied to classify malware images with the LBP feature. Performance comparison results among different classifiers with different image descriptors such as GIST, a spatial envelop, and the LBP demonstrate that our proposed approach outperforms others. |
URL | https://ieeexplore.ieee.org/document/8258512/ |
DOI | 10.1109/BigData.2017.8258512 |
Citation Key | luo_binary_2017 |
- machine learning
- visualization
- Trojan horses
- Support vector machines
- Resiliency
- resilience
- pubcrawl
- privacy
- pattern classification
- Metrics
- malware images
- malware classification methodology
- malware classification
- malware
- binary image
- local binary pattern
- learning (artificial intelligence)
- LBP feature
- invasive software
- image texture
- image descriptors
- Image color analysis
- image classification
- Human behavior
- feature extraction
- Cyber-security
- classification
- binary malware image classification