Clustering Malware at Scale: A First Full-Benchmark Study
Mocko, M., Ševcech, J., Chudá, D.
Recent years have shown that malware attacks still happen with high frequency. Malware experts seek to categorize and classify incoming samples to confirm their trustworthiness or prove their maliciousness. One of the ways in which groups of malware samples can be identified is through malware clustering. Despite the efforts of the community, malware clustering which incorporates benign samples has been under-explored. Moreover, despite the availability of larger public benchmark malware datasets, malware clustering studies have avoided fully utilizing these datasets in their experiments, often resorting to small datasets with only a few families. Additionally, the current state-of-the-art solutions for malware clustering remain unclear. Our study evaluates malware clustering quality and establishes the state-of-the-art on Bodmas and Ember – two large public benchmark malware datasets. Ours is the first study of malware clustering performed on whole malware benchmark datasets. Additionally, we extend the malware clustering task by incorporating benign samples. Our results indicate that incorporating benign samples does not significantly degrade clustering quality. We find significant differences in the quality of the created clusters between Ember and Bodmas, as well as a private industry dataset. Contrary to popular opinion, our top clustering performers are K-Means and BIRCH, with DBSCAN and HAC falling behind.
Cite: Mocko, M., Ševcech, J., Chudá, D., Clustering Malware at Scale: A First Full-Benchmark Study, Availability, Reliability and Security. ARES 2025. Lecture Notes in Computer Science, vol 15993. Springer, Cham. https://doi.org/10.1007/978-3-032-00627-1_12