Malicious Office Macro Detection: Combined Features with Obfuscation and Suspicious Keywords

被引:2
|
作者
Chen, Xiang [1 ]
Wang, Wenbo [1 ]
Han, Weitao [1 ]
机构
[1] PLA Strateg Support Force Informat Engn Univ, Inst Informat Technol, Zhengzhou 450001, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 22期
基金
中国国家自然科学基金;
关键词
malicious document; VBA; macro; obfuscation; suspicious keywords; machine learning;
D O I
10.3390/app132212101
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Microsoft has implemented several measures to defend against macro viruses, including the use of the Antimalware Scan Interface (AMSI) and automatic macro blocking. Nevertheless, evidence shows that threat actors have found ways to bypass these mechanisms. As a result, phishing emails continue to utilize malicious macros as their primary attack method. In this paper, we analyze 77 obfuscation features from the attacker's perspective and extract 46 suspicious keywords in macros. We first combine the aforementioned two types of features to train machine learning models on a public dataset. Then, we conduct the same experiment on a self-constructed dataset consisting of newly discovered samples, in order to verify if our proposed method can identify previously unseen malicious macros. Experimental results demonstrate that, compared to existing methods, our proposed method has a higher detection rate and better consistency. Furthermore, ensemble multi-classifiers with distinct feature selection can further enhance the detection performance.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Detection of Android Malicious Obfuscation Applications Based on Multi-class Features
    Zhao, Meichen
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 1795 - 1799
  • [2] Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
    Maestre Vidal, Jorge
    Sotelo Monge, Marco Antonio
    SENSORS, 2020, 20 (07)
  • [3] PSDEM: A Feasible De-Obfuscation Method for Malicious PowerShell Detection
    Liu, Chao
    Xia, Bin
    Yu, Min
    Liu, Yunzheng
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 830 - 836
  • [4] The De-Obfuscation Method in the Static Detection of Malicious PDF Documents
    Wang, Yuntao
    Proceedings - 2021 7th Annual International Conference on Network and Information Systems for Computers, ICNISC 2021, 2021, : 44 - 47
  • [5] De-obfuscation and Detection of Malicious PDF Files with High Accuracy
    Lu, Xun
    Zhuge, Jianwei
    Wang, Ruoyu
    Cao, Yinzhi
    Chen, Yan
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 4890 - 4899
  • [6] Enhancing Cybersecurity With P-Code Analysis and XGBoost: A Novel Approach for Malicious VBA Macro Detection in Office Documents
    Ahmadi, Candra
    Chen, Jiann-Liang
    Lai, Yi-Cheng
    IEEE ACCESS, 2024, 12 : 71746 - 71760
  • [7] Features combination for the detection of malicious Twitter accounts
    David, Isaac
    Siordia, Oscar S.
    Moctezuma, Daniela
    2016 IEEE INTERNATIONAL AUTUMN MEETING ON POWER, ELECTRONICS AND COMPUTING (ROPEC), 2016,
  • [8] Malicious Java']JavaScript Detection by Features Extraction
    Canfora, Gerardo
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    E-INFORMATICA SOFTWARE ENGINEERING JOURNAL, 2014, 8 (01) : 65 - 78
  • [9] Code Modification and Obfuscation Detection Test Using Malicious Script Distributing Website Inspection Technology
    Park, Seong-Min
    Bae, Han-Chul
    Cha, Young-Tae
    Kim, Hwan-Kuk
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 74 - 80
  • [10] Combined Segmentation Technique for Suspicious Mass Detection in Mammography
    Makandar, Aziz
    Halalli, Bhagirathi
    2015 INTERNATIONAL CONFERENCE ON TRENDS IN AUTOMATION, COMMUNICATIONS AND COMPUTING TECHNOLOGY (I-TACT-15), 2015,