Malicious Office Macro Detection: Combined Features with Obfuscation and Suspicious Keywords

被引:2
|
作者
Chen, Xiang [1 ]
Wang, Wenbo [1 ]
Han, Weitao [1 ]
机构
[1] PLA Strateg Support Force Informat Engn Univ, Inst Informat Technol, Zhengzhou 450001, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 22期
基金
中国国家自然科学基金;
关键词
malicious document; VBA; macro; obfuscation; suspicious keywords; machine learning;
D O I
10.3390/app132212101
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Microsoft has implemented several measures to defend against macro viruses, including the use of the Antimalware Scan Interface (AMSI) and automatic macro blocking. Nevertheless, evidence shows that threat actors have found ways to bypass these mechanisms. As a result, phishing emails continue to utilize malicious macros as their primary attack method. In this paper, we analyze 77 obfuscation features from the attacker's perspective and extract 46 suspicious keywords in macros. We first combine the aforementioned two types of features to train machine learning models on a public dataset. Then, we conduct the same experiment on a self-constructed dataset consisting of newly discovered samples, in order to verify if our proposed method can identify previously unseen malicious macros. Experimental results demonstrate that, compared to existing methods, our proposed method has a higher detection rate and better consistency. Furthermore, ensemble multi-classifiers with distinct feature selection can further enhance the detection performance.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Malicious traffic detection combined deep neural network with hierarchical attention mechanism
    Xiaoyang Liu
    Jiamiao Liu
    Scientific Reports, 11
  • [42] Malicious traffic detection combined deep neural network with hierarchical attention mechanism
    Liu, Xiaoyang
    Liu, Jiamiao
    SCIENTIFIC REPORTS, 2021, 11 (01)
  • [43] A Dynamic and Static Combined Android Malicious Code Detection Model based on SVM
    Du, Jinran
    Chen, Huajun
    Zhong, Weijie
    Liu, Zhen
    Xu, Aidong
    2018 5TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2018, : 801 - 806
  • [44] Automatic detection of suspicious behavior of pickpockets with track-based features in a shopping mall
    Bouma, Henri
    Baan, Jan
    Burghouts, Gertjan J.
    Eendebak, Pieter T.
    van Huis, Jasper R.
    Dijk, Judith
    van Rest, Jeroen H. C.
    OPTICS AND PHOTONICS FOR COUNTERTERRORISM, CRIME FIGHTING, AND DEFENCE X; AND OPTICAL MATERIALS AND BIOMATERIALS IN SECURITY AND DEFENCE SYSTEMS TECHNOLOGY XI, 2014, 9253
  • [45] Android malware obfuscation variants detection method based on multi-granularity opcode features
    Tang, Junwei
    Li, Ruixuan
    Jiang, Yu
    Gu, Xiwu
    Li, Yuhua
    Future Generation Computer Systems, 2022, 129 : 141 - 151
  • [46] Android malware obfuscation variants detection method based on multi-granularity opcode features
    Tang, Junwei
    Li, Ruixuan
    Jiang, Yu
    Gu, Xiwu
    Li, Yuhua
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 129 : 141 - 151
  • [47] SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods
    Cohen, Aviad
    Nissim, Nir
    Rokach, Lior
    Elovici, Yuval
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 63 : 324 - 343
  • [48] A Novel Method for Malicious Implanted Computer Video Cable Detection via Electromagnetic Features
    Huang, Weiqing
    Feng, Zhaowen
    Xu, Yanyun
    Zhang, Ning
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [49] A novel method for malicious implanted computer video cable detection via electromagnetic features
    Huang, Weiqing
    Feng, Zhaowen
    Xu, Yanyun
    Zhang, Ning
    IEEE Wireless Communications and Networking Conference, WCNC, 2021, 2021-March
  • [50] Algorithmically generated malicious domain names detection based on n-grams features
    Cucchiarelli, Alessandro
    Morbidoni, Christian
    Spalazzi, Luca
    Baldi, Marco
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 170