Dynamic Malware Analysis Based on API Sequence Semantic Fusion

被引:8
|
作者
Zhang, Sanfeng [1 ,2 ]
Wu, Jiahao [1 ]
Zhang, Mengzhe [1 ]
Yang, Wang [1 ,2 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211189, Peoples R China
[2] Southeast Univ, Key Lab Comp Network & Informat Integrat, Minist Educ, Nanjing 211189, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 11期
关键词
malware; dynamic analysis; API call sequence; semantic feature; fusion; LEARNING APPROACH; CLASSIFICATION;
D O I
10.3390/app13116526
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The existing dynamic malware detection methods based on API call sequences ignore the semantic information of functions. Simply mapping API to numerical values does not reflect whether a function has performed a query or modification operation, whether it is related to network communication, the file system, or other factors. Additionally, the detection performance is limited when the size of the API call sequence is too large. To address this issue, we propose Mal-ASSF, a novel malware detection model that fuses the semantic and sequence features of the API calls. The API2Vec embedding method is used to obtain the dimensionality reduction representation of the API function. To capture the behavioral features of sequential segments, Balts is used to extract the features. To leverage the implicit semantic information of the API functions, the operation and the type of resource operated by the API functions are extracted. These semantic and sequential features are then fused and processed by the attention-related modules. In comparison with the existing methods, Mal-ASSF boasts superior capabilities in terms of semantic representation and recognition of critical sequences within API call sequences. According to the evaluation with a dataset of malware families, the experimental results show that Mal-ASSF outperforms existing solutions by 3% to 5% in detection accuracy.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] MalEXLNet:A semantic analysis and detection method of malware API sequence based on EXLNet model
    Mao, Xuedong
    Zhao, Yuntao
    Feng, Yongxin
    Hu, Yutao
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (10): : 3060 - 3083
  • [2] Malware Detection Method based on Dynamic Variable Length API Sequence
    Bai, Jinrong
    Shi, Qibin
    2019 12TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2019), 2019, : 285 - 288
  • [3] Dynamic API call sequence visualisation for malware classification
    Tang, Mingdong
    Qian, Quan
    IET INFORMATION SECURITY, 2019, 13 (04) : 367 - 377
  • [4] Multi-perspective API call sequence behavior analysis and fusion for malware classification
    Wu, Peng
    Gao, Mohan
    Sun, Fuhui
    Wang, Xiaoyan
    Pan, Li
    COMPUTERS & SECURITY, 2025, 148
  • [5] A Novel Approach to Detect Malware Based on API Call Sequence Analysis
    Ki, Youngjoon
    Kim, Eunjin
    Kim, Huy Kang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [6] A novel deep framework for dynamic malware detection based on API sequence intrinsic features
    Li, Ce
    Lv, Qiujian
    Li, Ning
    Wang, Yan
    Sun, Degang
    Qiao, Yuanyuan
    COMPUTERS & SECURITY, 2022, 116
  • [7] Evading API Call Sequence Based Malware Classifiers
    Fadadu, Fenil
    Handa, Anand
    Kumar, Nitesh
    Shukla, Sandeep Kumar
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 18 - 33
  • [8] Contextual Identification of Windows Malware through Semantic Interpretation of API Call Sequence
    Amer, Eslam
    El-Sappagh, Shaker
    Hu, Jong Wan
    APPLIED SCIENCES-BASEL, 2020, 10 (21): : 1 - 15
  • [9] A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence
    Amer, Eslam
    Zelinka, Ivan
    COMPUTERS & SECURITY, 2020, 92
  • [10] DMalNet: Dynamic malware analysis based on API feature engineering and graph learning
    Li, Ce
    Cheng, Zijun
    Zhu, He
    Wang, Leiqi
    Lv, Qiujian
    Wang, Yan
    Li, Ning
    Sun, Degang
    COMPUTERS & SECURITY, 2022, 122