Malware Images Visualization and Classification with Parameter Tunned Deep Learning Model
DOI:
https://doi.org/10.63278/1336Keywords:
Malware Byte Code Conversion, Malware Visualization, Malware detection with Deep Learning.Abstract
Malwares can be termed as a malicious program that can gain unauthorized access to the computer. This unauthorized access can damage and harm computing world in many capacities. There are many malware detection approaches present in the world. These approaches include static and dynamic analysis, machine learning, semi -supervised and deep learning-based models. These approaches cannot be visualized, thus cyber security experts face difficulty in interpreting underlying patterns. Conversion of malware byte code into images exits. An improved approach that can not only visualize malware, but also predict malware with high accuracy can be beneficial. For this purpose, we have used existing malware visualization technique. A technique which converts malware samples into images and then applies a contrast-limited adaptive histogram equalization algorithm to enhance the similarity between malware image regions in the same family. After conversion into images, we have applied parametrized tunned Convolutional Model to predict malware images. Comparing with existing our approach not only visualizes malware images but also outperforms previous approach by almost 2%, by achieving 98.27% accuracy.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Muhammad Arham Tariq, Muhammad Ismaeel Khan, Aftab Arif, Muhammad Aksam Iftikhar, Ali Raza A Khan

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their published articles online (e.g., in institutional repositories or on their website, social networks like ResearchGate or Academia), as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).

Except where otherwise noted, the content on this site is licensed under a Creative Commons Attribution 4.0 International License.



According to the