网络与信息安全学报 (Oct 2023)

Review of malware detection and classification visualization techniques

  • Jinwei WANG, Zhengjia CHEN, Xue XIE, Xiangyang LUO, Bin MA

DOI
https://doi.org/10.11959/j.issn.2096-109x.2023064
Journal volume & issue
Vol. 9, no. 5
pp. 1 – 20

Abstract

Read online

With the rapid advancement of technology, network security faces a significant challenge due to the proliferation of malicious software and its variants.These malicious software use various technical tactics to deceive or bypass traditional detection methods, rendering conventional non-visual detection techniques inadequate.In recent years, data visualization has gained considerable attention in the academic community as a powerful approach for detecting and classifying malicious software.By visually representing the key features of malicious software, these methods greatly enhance the accuracy of malware detection and classification, opening up extensive research opportunities in the field of cyber security.An overview of traditional non-visual detection techniques and visualization-based methods were provided in the realm of malicious software detection.Traditional non-visual approaches for malicious software detection, including static analysis, dynamic analysis, and hybrid techniques, were introduced.Subsequently, a comprehensive survey and evaluation of prominent contemporary visualization-based methods for detecting malicious software were undertaken.This primarily encompasses encompassed the integration of visualization with machine learning and visualization combined with deep learning, each of which exhibits distinct advantages and characteristics within the domain of malware detection and classification.Consequently, the holistic consideration of several factors, such as dataset size, computational resources, time constraints, model accuracy, and implementation complexity, is necessary for the selection of detection and classification methods.In conclusion, the challenges currently faced by detection technologies are summarized, and a forward-looking perspective on future research directions in the field is provided.

Keywords