Malicious Office Macro Detection: Combined Features with Obfuscation and Suspicious Keywords

被引:2
|
作者
Chen, Xiang [1 ]
Wang, Wenbo [1 ]
Han, Weitao [1 ]
机构
[1] PLA Strateg Support Force Informat Engn Univ, Inst Informat Technol, Zhengzhou 450001, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 22期
基金
中国国家自然科学基金;
关键词
malicious document; VBA; macro; obfuscation; suspicious keywords; machine learning;
D O I
10.3390/app132212101
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Microsoft has implemented several measures to defend against macro viruses, including the use of the Antimalware Scan Interface (AMSI) and automatic macro blocking. Nevertheless, evidence shows that threat actors have found ways to bypass these mechanisms. As a result, phishing emails continue to utilize malicious macros as their primary attack method. In this paper, we analyze 77 obfuscation features from the attacker's perspective and extract 46 suspicious keywords in macros. We first combine the aforementioned two types of features to train machine learning models on a public dataset. Then, we conduct the same experiment on a self-constructed dataset consisting of newly discovered samples, in order to verify if our proposed method can identify previously unseen malicious macros. Experimental results demonstrate that, compared to existing methods, our proposed method has a higher detection rate and better consistency. Furthermore, ensemble multi-classifiers with distinct feature selection can further enhance the detection performance.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Fake fingerprint liveness detection based on micro and macro features
    Agrawal, Rohit
    Jalal, Anand Singh
    Arya, K. V.
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2019, 11 (02) : 177 - 206
  • [32] Malicious Word Document Detection Based On Multi-View Features Learning
    Lu Xiaofeng
    Wang Fei
    Shu Zifeng
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [33] A supplementary method for malicious detection based on Http-Activity similarity features
    Tran, Manh Cong
    Nakamura, Yasuhiro
    Journal of Communications, 2014, 9 (12): : 923 - 929
  • [34] A Malicious Mining Code Detection Method Based on Multi-Features Fusion
    Li, Shudong
    Jiang, Laiyuan
    Zhang, Qianqing
    Wang, Zhen
    Tian, Zhihong
    Guizani, Mohsen
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05): : 2731 - 2739
  • [35] A Dynamic Malicious Document Detection Method Based on Multi-Memory Features
    Wang, Yuanyuan
    Li, Gengwang
    Yu, Min
    Chow, Kam-Pui
    Jiang, Jianguo
    Meng, Xiang
    Huang, Weiqing
    IFIP Advances in Information and Communication Technology, 2023, 687 AICT : 203 - 218
  • [36] A Fusion Malicious Social Bots Detection Model Based on Static and Dynamic Features
    Jiang, Hongling
    Liu, Dan
    Kang, Haiyan
    Wang, Yilin
    International Journal of Network Security, 2022, 24 (02) : 321 - 332
  • [37] Malicious PDF Files Detection Using Structural and Java']Javascript Based Features
    Dabral, Sonal
    Agarwal, Amit
    Mahajan, Manish
    Kumar, Sachin
    INFORMATION, COMMUNICATION AND COMPUTING TECHNOLOGY, 2017, 750 : 137 - 147
  • [38] Lexical features based malicious URL detection using machine learning techniques
    Saleem Raja, A.
    Vinodini, R.
    Kavitha, A.
    MATERIALS TODAY-PROCEEDINGS, 2021, 47 : 163 - 166
  • [39] A Study on Flow Features Selection for Malicious Activities Detection in Software Defined Networks
    Jankowski, Damian
    Amanowicz, Marek
    2018 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2018,
  • [40] A Multiclass Detection System for Android Malicious Apps Based on Color Image Features
    Zhang, Hua
    Qin, Jiawei
    Zhang, Boan
    Yan, Hanbing
    Guo, Jing
    Gao, Fei
    Wang, Senmiao
    Hu, Yangye
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020