Abstract
The proposed paper investigates commercial antiviruses. About 17% of the antiviruses did not recognize the existence of the malicious samples analyzed. In order to overcome the limitations of commercial antiviruses, this project creates an antivirus able to identify the modus operandi of a malware application before it is even executed by the user. In the proposed methodology, the features extracted from the executables are the input attributes of artificial neural networks. The classification of neural networks aims to group executables of 32-bit architectures into two classes: benign and malware. In total, 6272 executables are used in order to validate the proposed methodology. The proposed antivirus achieves an average performance of 98.32% in the distinction between benign and malware executables, accompanied by an average response time of only 0.07 s. Our antivirus is statistically superior and more effective when compared to the best state-of-the-art antivirus. The limitations of commercial antiviruses can be catering for artificial intelligence techniques based on machine learning. Instead of empirical and heuristic models, the proposed work identifies, in a statistical way, behaviors previously classified as suspects in real time.










Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Notes
Windows PE format. Available in https://docs.microsoft.com/en-us/windows/desktop/debug/pe-format. Accessed on June 2019.
TheZoo: 32-bit architectures malwares executable databases. Available in: https://github.com/ytisf/theZoo. Accessed on November 2018.
Sourceforge: Benign Application Repository. Available in: https://sourceforge.net/. Accessed on November 2018.
Github: Benign Application Repository. Available in: https://github.com/. Accessed on November 2018.
Sysinternals: Benign Application Repository. Available in: https://live.sysinternals.com/. Accessed on November 2018.
PE (Portable Executable) file explorer. Available in: http://www.heaventools.com/. Accessed on February 2019.
IDA: multiprocessor disassembler. Available in: https://www.hex-rays.com/products/ida/. Accessed on February 2019.
References
INTEL. McAfee Labs: Threat Report. https://www.mcafee.com/us/resources/reports/rp-quarterly-threats-mar-2017.pdf. Accessed on Apr 2020
CISCO 2018 Annual Cybersecurity Report. https://www.cisco.com/c/dam/m/hu_hu/campaigns/security-hub/pdf/acr-2018.pdf. Accessed on June 2020
Huda, S., et al.: A defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data. Inf. Sci. 379, 211–228 (2017)
Fan, Y., Ye, Y., Chen, L.: Malicious sequential pattern mining for automatic malware detection. Exp. Syst. Appl. 52, 16–25 (2016)
Nissim, N., Moskovith, R., Rokach, L., Elovici, Y.: Novel active learning methods for enhanced PC malware detection in windows OS. Exp. Syst. Appl. 41, 5843–5857 (2014)
Ahmed, A.E.E., Maarof, M.A., Barry, B.I.A., Hamza, H.: Enhancing the detection of metamorphic malware using call graphs. Comput. Secur. 46, 62–78 (2014)
Eskandari, M., Hashemi, S.: A graph mining approach for detecting unknown malwares. J. Vis. Lang. Comput. 23, 154–162 (2012)
Perdisci, R., Lanzi, A., Lee, W.: Classification of packed executables for accurate computer virus detection. Pattern Recognit. Lett. 29, 1941–1946 (2008)
REWEMA (Retrieval of 32-bit Windows Architecture Executables Applied to Malware Analysis). https://github.com/rewema/rewema. Accessed on Feb 2020
VIRUSTOTAL. Online service in order to identify malware files by main commercial antiviruses worldwide. https://www.virustotal.com. Accessed on Feb 2020
VXHEAVEN. 32-bit architectures malwares executable databases. http://vxheaven.org/. Accessed on June 2017
Amor, N.B., Benferhat, S., Elouedi, Z.: Naive Bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 420–424 (2004)
Huang, G.B., Zhou, H., Ding, X.E., Zhang, R.: Extreme learning machine for regression and multiclass classification. IEEE Trans. Syst. Man Cybern. 42(2), 513–519 (2012)
Lima, S.M.L.: Limitation of COTS antiviruses: issues, controversies, and problems of COTS antiviruses. In: Cruz-Cunha, M.M., Mateus-Coelho, N.R. (eds.) Handbook of Research on Cyber Crime and Information Privacy, vol. 1, 1st edn. IGI Global, Hershey (2020)
Mohammed, M., Khan, M., Bashier, E.: Machine Learning: Algorithms and Applications. CRC Press, Boca Raton (2016)
Hecht-Nielsen, R.: Kolmogorov’s mapping neural network existence theorem. In: IEEE First Annual International Conference on Neural Networks, vol. 3, pp. 11–13 (1987)
Hagan, M.T., Demuth, H.B., Beale, M.H.: Neural Network Design. Martin Hagan, Oklahoma State University, Stillwater (2014)
Aminifard, Z., Babaie-Kafaki, S.: A restart scheme for the Dai–Liao conjugate gradient method by ignoring a direction of maximum magnification by the search direction matrix. RAIRO Oper. Res. 54, 981–991 (2020)
Notay, Y.: Flexible conjugate gradients. SIAM J. Sci. Comput. 22(4), 1444 (2000). https://doi.org/10.1137/S1064827599362314
Al-Bayati, A., Saleh, I.A., Abbo, K.K.: Conjugate gradient back-propagation with modified Polack–Rebier updates for training feed forward neural network. Iraqi J. Stat. Sci. 11(20), 164–173 (2011)
Yue, X., Guo, Y., Wang, J., Mao, X., Lei, X.: Water pollution forecasting model of the back-propagation neural network based on one step secant algorithm. In: International Conference on Information Computing and Applications, vol. 105. Springer, Berlin (2010)
Hermanto, R.P., Suharjito, D., Nugroho, A.: Waiting-time estimation in bank customer queues using RPROP neural networks. Procedia Comput. Sci. 135, 35–42 (2018)
Nagamalai, D., Renault, E., Dhanuskodi, M.: Trends in Computer Science, Engineering and Information Technology. Communications in Computer and Information Science, vol. 204. Springer, Berlin (2011)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Human and animal rights participants
The authors declare that no human participants were involved in this research.
Informed consent
This research did not include healthcare intervention of human participants.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
de Lima, S.M.L., Silva, H.K.d.L., Luz, J.H.d.S. et al. Artificial intelligence-based antivirus in order to detect malware preventively. Prog Artif Intell 10, 1–22 (2021). https://doi.org/10.1007/s13748-020-00220-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13748-020-00220-4