IMAT – Intuitive Malware Analyser Tool

[{“box”:0,”content”:”[if 992 equals=”Open Access”]

n

Open Access

n

[/if 992]n

n

Year : April 4, 2024 at 12:49 pm | [if 1553 equals=””] Volume :12 [else] Volume :12[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    vector

    n

    J. Dhiviya Rose, Kaushal Tiwari, Priyanshee Sethi, Tanya Goyal, Sakshi Sati

  1. [/foreach]

    n

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. AI Cluster, BCA Student, BCA Student, BCA Student, BCA Student, School of Computer Science, University of Petroleum and Energy Studies (UPES), Bidholi, Dehradun, School of Computer Science, University of Petroleum and Energy Studies (UPES), Bidholi, Dehradun, School of Computer Science, University of Petroleum and Energy Studies (UPES), Bidholi, Dehradun, School of Computer Science, University of Petroleum and Energy Studies (UPES), Bidholi, Dehradun, School of Computer Science, University of Petroleum and Energy Studies (UPES), Bidholi, Dehradun, Uttarakhand, Uttarakhand, Uttarakhand, Uttarakhand, Uttarakhand, India, India, India, India, India
  2. n[/if 1175][/foreach]

[/if 2099][if 2099 equals=”Yes”][/if 2099]nn

n

Abstract

nMalware refers to malicious software intentionally created to damage or exploit computer systems, networks, and devices. Malware can steal information, damage computers, and cause other problems disrupting normal computer operations, or gaining unauthorized access to systems. Our proposed system – “IMAT -Intuitive Malware Analyzer Tool” uses special Python tools like VirusTotal and YARA to look for and understand malware. Imagine having a guard for your computer that checks all the files to make sure they are safe. That’s what our Malware Analyzer does, a helpful tool created using Python. The proposed system is designed to check files where it looks at files to see if they might be harmful. It can also ask VirusTotal, a big online database, if the file is known to be bad. Finding Bad Patterns which are common in malware using YARA helps it catch even new kinds of malware. It designed to create easy-to-read reports so that people can understand what it found and how to stay safe. Our Malware Analyzer proves beneficial for individuals seeking to safeguard their computers against malicious software. It makes finding and stopping malware easier, which helps everyone stay more secure online. In this project, we’ll explain how to use our analyzer to protect your digital world.

n

n

n

Keywords: Malware, YARA, VirusTotal, Analyzer, Security

n[if 424 equals=”Regular Issue”][This article belongs to Journal Of Network security(jons)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal Of Network security(jons)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: J. Dhiviya Rose, Kaushal Tiwari, Priyanshee Sethi, Tanya Goyal, Sakshi Sati IMAT – Intuitive Malware Analyser Tool jons April 4, 2024; 12:-

n

How to cite this URL: J. Dhiviya Rose, Kaushal Tiwari, Priyanshee Sethi, Tanya Goyal, Sakshi Sati IMAT – Intuitive Malware Analyser Tool jons April 4, 2024 {cited April 4, 2024};12:-. Available from: https://journals.stmjournals.com/jons/article=April 4, 2024/view=0

n


n[if 992 equals=”Open Access”] Full Text PDF Download[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘jons’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

[1] Talukder S. Tools and techniques for malware detection and analysis. arXiv preprint arXiv:2002.06819. 2020 Feb 17.
[2] Zolkipli MF, Jantan A. Malware behavior analysis: Learning and understanding current malware threats. In2010 Second International Conference on Network Applications, Protocols and Services 2010 Sep 22 (pp. 218-221). IEEE.
[3] Aslan Ö, Samet R. Investigation of possibilities to detect malware using existing tools. In2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA) 2017 Oct 30 (pp. 1277-1284). IEEE.
[4] Peng P, Yang L, Song L, Wang G. Opening the blackbox of virustotal: Analyzing online phishing scan engines. InProceedings of the Internet Measurement Conference 2019 Oct 21 (pp. 478-485).
[5] Maier D, Müller T, Protsenko M. Divide-and-conquer: Why android malware cannot be stopped. In2014 Ninth International Conference on Availability, Reliability and Security 2014 Sep 8 (pp. 30-39). IEEE.
[6] Jamalpur S, Navya YS, Raja P, Tagore G, Rao GR. Dynamic malware analysis using cuckoo sandbox. In2018 Second international conference on inventive communication and computational technologies (ICICCT) 2018 Apr 20 (pp. 1056-1060). IEEE.
[7] Leka C, Ntantogian C, Karagiannis S, Magkos E, Verykios VS. A Comparative Analysis of VirusTotal and Desktop Antivirus Detection Capabilities. In2022 13th International
Conference on Information, Intelligence, Systems & Applications (IISA) 2022 Jul 18 (pp. 1-6). IEEE.
[8] Naik N, Jenkins P, Cooke R, Gillett J, Jin Y. Evaluating automatically generated YARA rules and enhancing their effectiveness. In2020 IEEE Symposium Series on Computational Intelligence (SSCI) 2020 Dec 1 (pp. 1146-1153). IEEE.
[9] Chakkaravarthy SS, Sangeetha D, Vaidehi V. A survey on malware analysis and mitigation techniques. Computer Science Review. 2019 May 1;32:1-23.
[10] Ucci D, Aniello L, Baldoni R. Survey of machine learning techniques for malware analysis. Computers & Security. 2019 Mar 1;81:123-47.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Journal Of Network security

n

[if 344 not_equal=””]ISSN: 2395-6739[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 2146 equals=”Yes”]

[/if 2146][if 2146 not_equal=”Yes”]

[/if 2146]n

n

n

Volume 12
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received February 3, 2024
Accepted February 8, 2024
Published April 4, 2024

n

n

n

n

n

n

nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]