Malicious Office Macro Detection: Combined Features with Obfuscation and Suspicious Keywords

被引:2
|
作者
Chen, Xiang [1 ]
Wang, Wenbo [1 ]
Han, Weitao [1 ]
机构
[1] PLA Strateg Support Force Informat Engn Univ, Inst Informat Technol, Zhengzhou 450001, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 22期
基金
中国国家自然科学基金;
关键词
malicious document; VBA; macro; obfuscation; suspicious keywords; machine learning;
D O I
10.3390/app132212101
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Microsoft has implemented several measures to defend against macro viruses, including the use of the Antimalware Scan Interface (AMSI) and automatic macro blocking. Nevertheless, evidence shows that threat actors have found ways to bypass these mechanisms. As a result, phishing emails continue to utilize malicious macros as their primary attack method. In this paper, we analyze 77 obfuscation features from the attacker's perspective and extract 46 suspicious keywords in macros. We first combine the aforementioned two types of features to train machine learning models on a public dataset. Then, we conduct the same experiment on a self-constructed dataset consisting of newly discovered samples, in order to verify if our proposed method can identify previously unseen malicious macros. Experimental results demonstrate that, compared to existing methods, our proposed method has a higher detection rate and better consistency. Furthermore, ensemble multi-classifiers with distinct feature selection can further enhance the detection performance.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Less Is More: Robust and Novel Features for Malicious Domain Detection
    Hajaj, Chen
    Hason, Nitay
    Dvir, Amit
    ELECTRONICS, 2022, 11 (06)
  • [22] Enhancing Detection of Malicious URLs Using Boosting and Lexical Features
    Atrees, Mohammad
    Ahmad, Ashraf
    Alghanim, Firas
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (03): : 1405 - 1422
  • [23] Analysis of NetFlow Features' Importance in Malicious Network Traffic Detection
    Campazas-Vega, Adrian
    Samuel Crespo-Martinez, Ignacio
    Manuel Guerrero-Higueras, Angel
    Alvarez-Aparicio, Claudia
    Matellan, Vicente
    14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS AND 12TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATIONAL (CISIS 2021 AND ICEUTE 2021), 2022, 1400 : 52 - 61
  • [24] CAFE: Robust Detection of Malicious Macro based on Cross-modal Feature Extraction
    Bao, Huaifeng
    Wang, Xingyu
    Li, Wenhao
    Xu, Jinpeng
    Yin, Peng
    Wang, Wen
    Liu, Feng
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2534 - 2540
  • [25] Automated Microsoft Office Macro Malware Detection Using Machine Learning
    Bearden, Ruth
    Lo, Dan Chai-Tien
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4448 - 4452
  • [26] MFFAN: Multiple Features Fusion with Attention Networks for Malicious Traffic Detection
    Huang, Weiqing
    Han, Xinbo
    Zhang, Meng
    Le, Min
    Liu, Wen
    Yang, Zheng
    Yang, Haitian
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 391 - 398
  • [27] MADFU: An Improved Malicious Application Detection Method Based on Features Uncertainty
    Yuan, Hongli
    Tang, Yongchuan
    ENTROPY, 2020, 22 (07)
  • [28] Suspicious Face Detection based on Eye and other facial features Movement Monitoring
    Tiwari, Chandan
    Hanmandlu, Madasu
    Vasikarla, Shantaram
    2015 IEEE APPLIED IMAGERY PATTERN RECOGNITION WORKSHOP (AIPR), 2015,
  • [29] Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation)
    Jusoh, Rosmalissa
    Firdaus, Ahmad
    Anwar, Shahid
    Osman, Mohd Zamri
    Darmawan, Mohd Faaizie
    Ab Razak, Mohd Faizal
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 54
  • [30] GLDOC: detection of implicitly malicious MS-Office documents using graph convolutional networks
    Wang, Wenbo
    Yi, Peng
    Kou, Taotao
    Han, Weitao
    Wang, Chengyu
    CYBERSECURITY, 2024, 7 (01):