Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/15711
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sharmila, S. P. | en_US |
dc.contributor.author | Tiwari, Aruna | en_US |
dc.contributor.author | Chaudhari, Narendra S. | en_US |
dc.date.accessioned | 2025-02-24T13:24:37Z | - |
dc.date.available | 2025-02-24T13:24:37Z | - |
dc.date.issued | 2025 | - |
dc.identifier.citation | Sharmila, S. P., Gupta, S., Tiwari, A., & Chaudhari, N. S. (2025). Leveraging Memory Forensic Features for Explainable Obfuscated Malware Detection with Isolated Family Distinction Paradigm. Computers and Electrical Engineering. https://doi.org/10.1016/j.compeleceng.2025.110107 | en_US |
dc.identifier.issn | 0045-7906 | - |
dc.identifier.other | EID(2-s2.0-85217825331) | - |
dc.identifier.uri | https://doi.org/10.1016/j.compeleceng.2025.110107 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/15711 | - |
dc.description.abstract | In the IoT edge computing era, inevitable and ubiquitous presence of the internet is opening the door for numerous cyberattacks. Obfuscated malware adds layers of difficulty to detect complex modern cyber attacks by evading AI-enabled Next-Generation Anti-Virus (NGAV) scanners and breaching digital privacy. To tackle this problem, in this paper, we propose “Augmented Sparse Projection Oblique Random Forest (AugSPORF)”, an Explainable sparse projections based Oblique Random Forest (ORF) with Isolated Family Distinction (IFD) Paradigm to detect multiple obfuscated malware belonging to Spyware, Ransomware, and Trojan families effectively. Irrespective of obfuscation, malware variants possess common behavior and family traits aligned with their families and leave traces in the memory on execution. To begin with this motivation, we handle the huge dimension of memory forensic features with sparse random projections. Next, we perform feature importance aware training with ORF to learn inherent behavioral features of malware families by isolating the target family, and distinguishing with other families. Further, the model's scalability is assessed by increasing the number of malware families. To offer an insightful conclusion on the predictions, an Interpretable Machine Learning (IML) layer is interleaved to generate a report of explanations, thereby enhancing the interpretability of the model. The proposed approach yields an average accuracy of 96.76%, 96.45%, and 97.33% in detecting sub-families of Spyware, Ransomware, and Trojan respectively. Improved accuracy is also demonstrated by benchmarking the performance of AugSPORF on UCI repository datasets. © 2025 Elsevier Ltd | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier Ltd | en_US |
dc.source | Computers and Electrical Engineering | en_US |
dc.subject | Explainable AI | en_US |
dc.subject | Multi-class classification | en_US |
dc.subject | Ransomware | en_US |
dc.subject | Sparse Projections | en_US |
dc.subject | Spyware | en_US |
dc.subject | Trojan | en_US |
dc.title | Leveraging Memory Forensic Features for Explainable Obfuscated Malware Detection with Isolated Family Distinction Paradigm | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: