Skip to main content
Log in

Windows and IoT malware visualization and classification with deep CNN and Xception CNN using Markov images

  • Published:
Journal of Intelligent Information Systems Aims and scope Submit manuscript

Abstract

Context

Technological advances have led to a tremendous increase in complexity and volume of specialized malware, affecting computational devices across the globe. Along with malware targeting Windows devices, IoT devices having lesser computational power, have also been affected by malware attacks in the recent past. Due to a scarcity of updated malware datasets, malware recognition and classification has become trickier, particularly in IoT environments where malware samples are limited and scarce. Identifying a malware family can reveal the underlying intent of malware and traditional machine learning algorithms have performed well in this area. However, since such methods necessitate a large amount of feature engineering, deep learning algorithms for malware recognition and classification have been developed. In particular, the malware visualization-based approaches, which have shown decent success in the past have scope of improvement, which has been exploited in the current study.

Objectives

The current work aims at utilizing malware images (grayscale, RGB, markov) and deep CNNs for effective Windows and IoT malware recognition and classification using traditional learning and transfer learning approaches.

Methods and Design

First, grayscale, RGB and markov images were created from malware binaries. In particular, the idea of markov image generation by using markov probability matrix is to retain the global statistics of malware bytes which are generally lost during image transformation operations. A Gabor filter-based approach is utilized to extract textures and then a custom-built deep CNN and pretrained Xception CNN trained on 1.5 million images from ImageNet dataset, which is fine-tuned for malware images are employed for classifying malware images into families.

Results and Conclusions

To assess the effectiveness of the suggested framework, two public benchmark Windows malware image datasets, one custom built Windows malware image dataset and one custom built IoT malware image dataset were utilized. In particular, the methods demonstrate excellent classification results for the 500 GB Microsoft Malware Challenge dataset. A comparison of the suggested solutions with state-of-the-art methods clearly indicates the effectiveness and low computational cost of our malware recognition and classification solution.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data Availability

Microsoft (Ronen et al., 2018) dataset https://www.kaggle.com/c/malware-classification. Malimg (Nataraj et al., 2011) dataset https://www.kaggle.com/datasets/keerthicheepurupalli/malimg-dataset9010. Custom Windows malware dataset sources (https://virusshare.com/, https://github.com/ytisf/theZoo, https://vx-underground.org/archive/VxHeaven/index.html). Custom IoT malware dataset sources (https://vx-underground.org/archive/VxHeaven/index.html, https://github.com/ytisf/theZoo). Malware can cause damage to the computing environments therefore caution must be taken before downloading malware.

Code Availability

Code is available on request at https://forms.gle/mp9GihTmsAzAUNpT7.

References

Download references

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed equally in this manuscript.

Corresponding author

Correspondence to Akashdeep Sharma.

Ethics declarations

Conflict of interest

The authors state that they have no known competing financial interests or personal ties that could have appeared to affect the work reported in this study.

Consent to participate

Not Applicable.

Human and Animal Ethics

No Humans or Animals were harmed in any way.

Consent for publication

Not Applicable.

Credit authorship contribution statement

All authors contributed equally to this study.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, O., Sharma, A. & Kalia, A. Windows and IoT malware visualization and classification with deep CNN and Xception CNN using Markov images. J Intell Inf Syst 60, 349–375 (2023). https://doi.org/10.1007/s10844-022-00734-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10844-022-00734-4

Keywords

Navigation