JPEG Vigilant : AI-Powered Malware Image Detection

Authors

  • Prof. J. N. Ekatpure  Department of Computer Engineering, S. B. Patil College of Engineering, Indapur, Maharashtra, India
  • Nilesh Kharade  Department of Computer Engineering, S. B. Patil College of Engineering, Indapur, Maharashtra, India
  • Digvijay Korake  Department of Computer Engineering, S. B. Patil College of Engineering, Indapur, Maharashtra, India
  • Dipak Kshirsagar  Department of Computer Engineering, S. B. Patil College of Engineering, Indapur, Maharashtra, India
  • Rushikesh Mind  Department of Computer Engineering, S. B. Patil College of Engineering, Indapur, Maharashtra, India

Keywords:

Machine learning, malware, detection, JPEG, image, features.

Abstract

Cyberattacks against people, companies, and organizations have risen in recent years.In order to conduct an attack, cybercriminals are constantly searching for efficient channels to spread malware to targets. Millions of people use photos every day, and the majority of consumers believe that they are safe to use. However, some types of images may contain malicious payloads that carry out dangerous functions. Due in large part to its lossy compression, JPEG is the most widely used image for mat.In this study, we introduce JPEGVigilant, the first machine learning-based method designed exclusively for the quick and accurate identification of unknown malicious JPEG images. In order to distinguish between benign and malicious JPEG images, JPEGVigilant statically derives 10 straightforward yet discriminative properties from the JPEG LE structure.

References

  1. T. Kumar, S. Sharma, Goel, S. Chaudhary, and P. Jain. A Novel Machine Learning Approach for Malware Detection. Accessed: 2019. [Online]. Available:https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3383953
  2. S. Sharma, C. R. Krishna, and S. K. Sahay, ``Detection of advanced malware by machine learning techniques,'' in Soft Computing: Theories and Applications. Singapore: Springer, 2019, pp. 333342.
  3. N. Nissim, R. Moskovitch, L. Rokach, and Y. Elovici, ``Novel active learning methods for enhanced PC malware detection in windows OS,'‘ Expert Syst. Appl., vol. 41, no. 13, pp. 58435857, Oct. 2014.
  4. D. Nahmias, A. Cohen, N. Nissim, and Y. Elovici, ``TrustSign: Trusted malware signature generation in private clouds using deep feature transfer learning,'' in Proc. Int. Joint Conf. Neural Netw. (IJCNN), Jul. 2019,pp. 18.
  5. N. Nissim, A. Cohen, R. Moskovitch, A. Shabtai, M. Edri, O. Bar-Ad,and Y. Elovici, ``Keeping pace with the creation of new malicious PDF les using an active-learning based detection framework,'' Secur. Inform., vol. 5, p. 1, Dec. 2016.
  6. T. Denemark, P. Bas, and J. Fridrich, ``Natural steganography in JPEG compressed images,'' Electron. Imag., vol. 2018, no. 7, pp. 316-1316-10, Jan. 2018.
  7. D. Ucci, L. Aniello, and R. Baldoni, ``Survey of machine learning techniques for malware analysis,'' Comput. Secur., vol. 81, pp. 123147,Mar. 2019.
  8. O. Or-Meir, N. Nissim, Y. Elovici, and L. Rokach, ``Dynamic malware analysis in the modern eraA state of the art survey,'' CSURACMComput. Surv., vol. 52, no. 5, pp. 148, Sep. 2019.
  9. N. Nissim, A. Cohen, J. Wu, A. Lanzi, L. Rokach, Y. Elovici, and L. Giles, ``Sec-lib: Protecting scholarly digital libraries from infected papers using active machine learning framework,'' IEEE Access, vol. 7,pp. 110050110073, 2019.
  10. Y.-S. Jeong, J. Woo, and A. R. Kang, ``Malware detection on byte streams of PDF les using convolutional neural networks,'' Secur. Commun. Netw., vol. 2019, pp. 19, Apr. 2019.

Downloads

Published

2023-10-30

Issue

Section

Research Articles

How to Cite

[1]
Prof. J. N. Ekatpure, Nilesh Kharade, Digvijay Korake, Dipak Kshirsagar, Rushikesh Mind, " JPEG Vigilant : AI-Powered Malware Image Detection" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 10, pp.66-70, September-October-2023.