Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/15711
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSharmila, S. P.en_US
dc.contributor.authorTiwari, Arunaen_US
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2025-02-24T13:24:37Z-
dc.date.available2025-02-24T13:24:37Z-
dc.date.issued2025-
dc.identifier.citationSharmila, S. P., Gupta, S., Tiwari, A., & Chaudhari, N. S. (2025). Leveraging Memory Forensic Features for Explainable Obfuscated Malware Detection with Isolated Family Distinction Paradigm. Computers and Electrical Engineering. https://doi.org/10.1016/j.compeleceng.2025.110107en_US
dc.identifier.issn0045-7906-
dc.identifier.otherEID(2-s2.0-85217825331)-
dc.identifier.urihttps://doi.org/10.1016/j.compeleceng.2025.110107-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/15711-
dc.description.abstractIn the IoT edge computing era, inevitable and ubiquitous presence of the internet is opening the door for numerous cyberattacks. Obfuscated malware adds layers of difficulty to detect complex modern cyber attacks by evading AI-enabled Next-Generation Anti-Virus (NGAV) scanners and breaching digital privacy. To tackle this problem, in this paper, we propose “Augmented Sparse Projection Oblique Random Forest (AugSPORF)”, an Explainable sparse projections based Oblique Random Forest (ORF) with Isolated Family Distinction (IFD) Paradigm to detect multiple obfuscated malware belonging to Spyware, Ransomware, and Trojan families effectively. Irrespective of obfuscation, malware variants possess common behavior and family traits aligned with their families and leave traces in the memory on execution. To begin with this motivation, we handle the huge dimension of memory forensic features with sparse random projections. Next, we perform feature importance aware training with ORF to learn inherent behavioral features of malware families by isolating the target family, and distinguishing with other families. Further, the model's scalability is assessed by increasing the number of malware families. To offer an insightful conclusion on the predictions, an Interpretable Machine Learning (IML) layer is interleaved to generate a report of explanations, thereby enhancing the interpretability of the model. The proposed approach yields an average accuracy of 96.76%, 96.45%, and 97.33% in detecting sub-families of Spyware, Ransomware, and Trojan respectively. Improved accuracy is also demonstrated by benchmarking the performance of AugSPORF on UCI repository datasets. © 2025 Elsevier Ltden_US
dc.language.isoenen_US
dc.publisherElsevier Ltden_US
dc.sourceComputers and Electrical Engineeringen_US
dc.subjectExplainable AIen_US
dc.subjectMulti-class classificationen_US
dc.subjectRansomwareen_US
dc.subjectSparse Projectionsen_US
dc.subjectSpywareen_US
dc.subjectTrojanen_US
dc.titleLeveraging Memory Forensic Features for Explainable Obfuscated Malware Detection with Isolated Family Distinction Paradigmen_US
dc.typeJournal Articleen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: