Advanced Windows Methods on Malware Detection and Classification

被引:24
|
作者
Rabadi, Dima [1 ]
Teo, Sin G. [1 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
关键词
API calls; feature generation; malicious behavior analysis; dynamic analysis; anomaly-based detectors; malware detection; malware type classification; machine learning; API CALLS; FEATURES;
D O I
10.1145/3427228.3427242
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Application Programming Interfaces (APIs) are still considered the standard accessible data source and core wok of the most widely adopted malware detection and classification techniques. API-based malware detectors highly rely on measuring API's statistical features, such as calculating the frequency counter of calling specific API calls or finding their malicious sequence pattern (i.e., signature-based detectors). Using simple hooking tools, malware authors would help in failing such detectors by interrupting the sequence and shuffling the API calls or deleting/inserting irrelevant calls (i.e., changing the frequency counter). Moreover, relying on API calls (e.g., function names) alone without taking into account their function parameters is insufficient to understand the purpose of the program. For example, the same API call (e.g., writing on a file) would act in two ways if two different arguments are passed (e.g., writing on a system versus user file). However, because of the heterogeneous nature of API arguments, most of the available API-based malicious behavior detectors would consider only the API calls without taking into account their argument information (e.g., function parameters). Alternatively, other detectors try considering the API arguments in their techniques, but they acquire having proficient knowledge about the API arguments or powerful processors to extract them. Such requirements demand a prohibitive cost and complex operations to deal with the arguments. To overcome the above limitations, with the help of machine learning and without any expert knowledge of the arguments, we propose a light-weight API-based dynamic feature extraction technique, and we use it to implement a malware detection and type classification approach. To evaluate our approach, we use reasonable datasets of 7774 benign and 7105 malicious samples belonging to ten distinct malware types. Experimental results show that our type classification module could achieve an accuracy of 98.0253 %, where our malware detection module could reach an accuracy of over 99.8992 %, and outperforms many state-of-the-art API-based malware detectors.
引用
收藏
页码:54 / 68
页数:15
相关论文
共 50 条
  • [21] Deep Android Malware Detection and Classification
    Vinayakumar, R.
    Soman, K. P.
    Poornachandran, Prabaharan
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1677 - 1683
  • [22] COLLECTIVE CLASSIFICATION FOR UNKNOWN MALWARE DETECTION
    Santos, Igor
    Laorden, Carlos
    Bringas, Pablo G.
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 251 - 256
  • [23] Malware Detection based on Graph Classification
    Khanh-Huu-The Dam
    Touili, Tayssir
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 455 - 463
  • [24] A lightweight machine learning methods for malware classification
    Farfoura, Mahmoud E.
    Mashal, Ibrahim
    Alkhatib, Ahmad
    Batyha, Radwan M.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (01):
  • [25] The Analysis of Feature Selection Methods and Classification Algorithms in Permission Based Android Malware Detection
    Pehlivan, Ugur
    Baltaci, Nuray
    Acarturk, Cengiz
    Baykal, Nazife
    2014 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY (CICS), 2014, : 81 - 88
  • [26] Malware Classification Using Deep Learning Methods
    Cakir, Bugra
    Dogdu, Erdogan
    ACMSE '18: PROCEEDINGS OF THE ACMSE 2018 CONFERENCE, 2018,
  • [27] Methods for automatic malware analysis and classification: a survey
    Grzinic, Toni
    Gonzalez, Eduardo Blazquez
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 17 (1-2) : 179 - 203
  • [28] Automatic malware classification and new malware detection using machine learning
    Liu Liu
    Bao-sheng Wang
    Bo Yu
    Qiu-xi Zhong
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1336 - 1347
  • [29] Automatic malware classification and new malware detection using machine learning
    Liu, Liu
    Wang, Bao-sheng
    Yu, Bo
    Zhong, Qiu-xi
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (09) : 1336 - 1347
  • [30] Ensemble-Based Classification Using Neural Networks and Machine Learning Models for Windows PE Malware Detection
    Damasevicius, Robertas
    Venckauskas, Algimantas
    Toldinas, Jevgenijus
    Grigaliunas, Sarunas
    ELECTRONICS, 2021, 10 (04) : 1 - 26