MINES: Multi-perspective API Call Sequence Behavior Fusion Malware Classification

被引:1
|
作者
Gao, Mohan [1 ]
Wu, Peng [1 ,2 ]
Pan, Li [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai, Peoples R China
[2] Shanghai Jiao Tong Univ, Shanghai Key Lab Integrated Adm Technol Informat, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Malware Detection; Contrastive Learning; Graph Neural Network;
D O I
10.1007/978-981-97-5562-2_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing variety of malicious software, i.e., malware, has caused great damage and economic loss to computer systems. The API call sequence of malware reflects its dynamic behavior during execution, which is difficult to disguise. Therefore, API call sequence can serve as a robust feature for the detection and classification of malware. There are two distinct characteristics within the API call sequences of malware: 1) the API existence feature caused by frequent calls to the APIs with some special functions, and 2) the API transition feature caused by frequent calls to some special API subsequence patterns. Based on these two characteristics, this paper proposes the Multi-perspective apI call sequeNce bEhavior fuSion malware classification Method, called MINES. It adopts the graph contrastive learning framework to extract the API existence feature from two graphs that model relationships between APIs from different perspectives. Similarly, a CNN-based contrastive learning framework is adopted to extract the API transition feature from two sets of multi-hop transition matrices. Finally, the extracted two features are fused to classify malware. Experiments on five datasets demonstrate the superiority of MINES over various state-of-the-arts by a large margin.
引用
收藏
页码:210 / 220
页数:11
相关论文
共 50 条
  • [1] Multi-perspective API call sequence behavior analysis and fusion for malware classification
    Wu, Peng
    Gao, Mohan
    Sun, Fuhui
    Wang, Xiaoyan
    Pan, Li
    COMPUTERS & SECURITY, 2025, 148
  • [2] A Multi-Perspective malware detection approach through behavioral fusion of API call sequence
    Amer, Eslam
    Zelinka, Ivan
    El-Sappagh, Shaker
    COMPUTERS & SECURITY, 2021, 110
  • [3] Dynamic API call sequence visualisation for malware classification
    Tang, Mingdong
    Qian, Quan
    IET INFORMATION SECURITY, 2019, 13 (04) : 367 - 377
  • [4] Improvement of malware detection and classification using API call sequence alignment and visualization
    Hyunjoo Kim
    Jonghyun Kim
    Youngsoo Kim
    Ikkyun Kim
    Kuinam J. Kim
    Hyuncheol Kim
    Cluster Computing, 2019, 22 : 921 - 929
  • [5] Improvement of malware detection and classification using API call sequence alignment and visualization
    Kim, Hyunjoo
    Kim, Jonghyun
    Kim, Youngsoo
    Kim, Ikkyun
    Kim, Kuinam J.
    Kim, Hyuncheol
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 921 - 929
  • [6] Evading API Call Sequence Based Malware Classifiers
    Fadadu, Fenil
    Handa, Anand
    Kumar, Nitesh
    Shukla, Sandeep Kumar
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 18 - 33
  • [7] Malware Classification Using Dynamically Extracted API Call Embeddings
    Aggarwal, Sahil
    Di Troia, Fabio
    APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [8] Features Engineering for Malware Family Classification Based API Call
    Daeef, Ammar Yahya
    Al-Naji, Ali
    Chahl, Javaan
    COMPUTERS, 2022, 11 (11)
  • [9] A malware classification method based on directed API call relationships
    Ma, Cuihua
    Li, Zhenwan
    Long, Haixia
    Bilal, Anas
    Liu, Xiaowen
    PLOS ONE, 2025, 20 (03):
  • [10] Multi-perspective target classification
    Vespe, M
    Baker, CJ
    Griffiths, HD
    2005 IEEE INTERNATIONAL RADAR, CONFERENCE RECORD, 2005, : 877 - 882