Detecting Malware Activities With MalpMiner: A Dynamic Analysis Approach

被引:2
|
作者
Abdelwahed, Mustafa F. [1 ,2 ]
Kamal, Mustafa M. [2 ]
Sayed, Samir G. [2 ,3 ]
机构
[1] Helwan Univ, Fac Engn, Dept Comp & Syst Engn, Cairo 11792, Egypt
[2] Natl Telecom Regulatory Author NTRA, Egyptian Comp Emergency Readiness Team EG CERT, Cairo 12971, Egypt
[3] Helwan Univ, Fac Engn, Dept Elect & Commun Engn, Cairo 11792, Egypt
关键词
Cybersecurity; artificial intelligence; answer set programming; malware behaviour detec-tion; logic programming; emulation;
D O I
10.1109/ACCESS.2023.3266562
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Day by day, malware as a service becomes more popular and easy to acquire, thus allowing anyone to start an attack without any technical background, which in turn introduces challenges for detecting such attacks. One of those challenges is the detection of malware activities early to prevent harm as much as possible. This paper presents a trusted dynamic analysis approach based on Answer Set Programming (ASP), a logic engine inference named Malware-Logic-Miner (MalpMiner). ASP is a nonmonotonic reasoning engine built on an open-world assumption, which allows MalpMiner to adopt commonsense reasoning when capturing malware activities of any given binary. Furthermore, MalpMiner requires no prior training; therefore, it can scale up quickly to include more malware-attack attributes. Moreover, MalpMiner considers the invoked application programming interfaces' values, resulting in correct malware behaviour modelling. The baseline experiments prove the correctness of MalpMiner related to recognizing malware activities. Moreover, MalpMiner achieved a detection ratio of 99% with a false-positive rate of less than 1% while maintaining low computational costs and explaining the detection decision.
引用
收藏
页码:84772 / 84784
页数:13
相关论文
共 50 条
  • [41] Malware Detection in Android based on Dynamic Analysis
    Bhatia, Taniya
    Kaushal, Rishabh
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [42] DYNAMIC ANALYSIS OF MALWARE IN A VIRTUALIZED NETWORK ENVIRONMENT
    Zhuma Mera, Emilio
    Brito Casanova, Orlando Jesus
    Tubay Vergara, Jose
    Oviedo Bayas, Byron
    REVISTA CONRADO, 2021, 17 (78): : 113 - 120
  • [43] Integrated static and dynamic analysis for malware detection
    Shijo, P. V.
    Salim, A.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 804 - 811
  • [44] A framework for automated dynamic malware analysis for Linux
    Vurdelja, Igor
    Blazic, Ivan
    Bojic, Dragan
    Draskovic, Drazen
    2020 28TH TELECOMMUNICATIONS FORUM (TELFOR), 2020, : 379 - 382
  • [45] A Static and Dynamic Visual Debugger for Malware Analysis
    Yee, Chan Lee
    Chuan, Lee Ling
    Ismail, Mahamod
    Zainal, Nasharuddin
    18TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2012): GREEN AND SMART COMMUNICATIONS FOR IT INNOVATION, 2012, : 765 - 769
  • [46] Hypervisor-assisted dynamic malware analysis
    Roee S. Leon
    Michael Kiperberg
    Anat Anatey Leon Zabag
    Nezer Jacob Zaidenberg
    Cybersecurity, 4
  • [47] Cuckoo-based malware dynamic analysis
    Wang L.
    Wang B.
    Liu J.
    Miao Q.
    Zhang J.
    International Journal of Performability Engineering, 2019, 15 (03) : 772 - 781
  • [48] Skipping Sleeps in Dynamic Analysis of Multithreaded Malware
    Oyama, Yoshihiro
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 164 - 171
  • [49] Dynamic Malware analysis Using Cuckoo Sandbox
    Jamalpur, Sainadh
    Navya, Yamini Sai
    Raja, Perla
    Tagore, Gampala
    Rao, G. Rama Koteswara
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1056 - 1060
  • [50] Dynamic Analysis of Executables to Detect and Characterize Malware
    Smith, Michael R.
    Ingram, Joey B.
    Lamb, Christopher C.
    Draelos, Timothy J.
    Doak, Justin E.
    Aimone, James B.
    James, Conrad D.
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, : 16 - 22