Mining malicious behavioural patterns

被引:2
|
作者
Seifi, Hassan [1 ]
Parsa, Saeed [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Tehran, Iran
关键词
invasive software; data mining; malicious behavioural patterns; signature-based detections; obfuscation techniques; behaviour-based detection; discriminative graph mining techniques;
D O I
10.1049/iet-ifs.2017.0079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most malware producers bypass signature-based detections through obfuscation techniques. Therefore, in order to provide proactive and real-time protection, the researchers have begun to develop strategies for behaviour-based detection. Despite of being a popular and promising non-deterministic solution to detect various forms of malware families, behavioural modelling techniques suffer from relatively high false positive rate in malware detection. To overcome this problem, the authors shall seek for identifying patterns, representing malicious intent in all instances of a malware family. In this study, they propose a new technique based on discriminative graph mining techniques to identify discriminative subgraphs. The subgraphs represent behavioural patterns in each malware family. Their evaluation results demonstrate an average of 91% accuracy in detection of malicious programme behaviours, with no false positive.
引用
收藏
页码:60 / 70
页数:11
相关论文
共 50 条
  • [1] Mining for classes and patterns in behavioural data
    Adams, NM
    Hand, DJ
    Till, R
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2001, 52 (09) : 1017 - 1024
  • [2] Characterising Malicious Software with High-Level Behavioural Patterns
    Stastna, Jana
    Tomasek, Martin
    SOFSEM 2017: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2017, 10139 : 473 - 484
  • [3] Mining behavioural patterns from spatial data
    Maiti, Sandipan
    Subramanyam, R. B., V
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2019, 22 (02): : 618 - 628
  • [4] Mining permission patterns for contrasting clean and malicious android applications
    Moonsamy, Veelasha
    Rong, Jia
    Liu, Shaowu
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 122 - 132
  • [5] Assembling Behavioural Characteristics of Malicious Software
    Stastna, Jana
    Tomasek, Martin
    2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 406 - 411
  • [6] Malicious URL detection by dynamically mining patterns without pre-defined elements
    Huang, Da
    Xu, Kai
    Pei, Jian
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2014, 17 (06): : 1375 - 1394
  • [7] Malicious URL detection by dynamically mining patterns without pre-defined elements
    Da Huang
    Kai Xu
    Jian Pei
    World Wide Web, 2014, 17 : 1375 - 1394
  • [8] Malicious Behavior Patterns
    Dornhackl, Hermann
    Kadletz, Konstantin
    Luh, Robert
    Tavolato, Paul
    2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 384 - 389
  • [9] MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs
    Tao, Guanhong
    Zheng, Zibin
    Guo, Ziying
    Lyu, Michael R.
    IEEE TRANSACTIONS ON RELIABILITY, 2018, 67 (01) : 355 - 369
  • [10] Mining frequent itemsets in the presence of malicious participants
    Sekhavat, Y. A.
    Fathian, M.
    IET INFORMATION SECURITY, 2010, 4 (02) : 80 - 92