Towards stealthy malware detection

被引:0
|
作者
Stolfo, Salvatore J. [1 ]
Wang, Ke [1 ]
Li, Wei-Jen [1 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malcode can be easily hidden in document files and go undetected by standard technology. We demonstrate this opportunity of stealthy malcode insertion in several experiments using a standard COTS Anti-Virus (AV) scanner. Furthermore, in the case of zero-day malicious exploit code, signature-based AV scanners would fail to detect such malcode even if the scanner knew where to look. We propose the use of statistical binary content analysis of files in order to detect suspicious anomalous file segments that may suggest insertion of malcode. Experiments are performed to determine whether the approach of n-grarn analysis may provide useful evidence of a tainted file that would subsequently be subjected to further scrutiny. We further perform tests to determine whether known malcode can be easily distinguished from otherwise "normal" Windows executables, and whether self-encrypted files may be easy to spot. Our goal is to develop an efficient means by static content analysis of detecting suspect infected files. This approach may have value for scanning a large store of collected information, such as a database of shared documents. The preliminary experiments suggest the problem is quite hard requiring new research to detect stealthy malcode.
引用
收藏
页码:231 / +
页数:3
相关论文
共 50 条
  • [1] Introducing Adjuvants to Dendritic Cell Algorithm for Stealthy Malware Detection
    Fu, Jun
    Yang, Huan
    2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 2, 2012, : 18 - 22
  • [2] Stealthy Malware Traffic - Not as Innocent as It Looks
    Zhong, Xingsi
    Fu, Yu
    Yu, Lu
    Brooks, Richard
    Venayagamoorthy, G. Kumar
    2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2015, : 110 - 116
  • [3] Towards the Detection of Isolation-Aware Malware
    Rodriguez, R. J.
    Rodriguez, I.
    Alonso, J.
    IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (02) : 1024 - 1036
  • [4] A Fast Approach Towards Android Malware Detection
    Chi, Hongmei
    Simms, Xavier
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT I, 2015, 9155 : 77 - 89
  • [5] Poster: Towards Sustainable Android Malware Detection
    Cai, Haipeng
    Jenkins, John
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 2018, : 350 - 351
  • [6] Towards An Effective And Efficient Malware Detection System
    Chia Tien Dan Lo
    Pablo, Ordonez
    Carlos, Cepeda Mora
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 3648 - 3655
  • [7] Towards Explainable CNNs for Android Malware Detection
    Kinkead, Martin
    Millar, Stuart
    McLaughlin, Niall
    O'Kane, Philip
    12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2021, 184 : 959 - 965
  • [8] Poster: Towards Adversarial Detection of Mobile Malware
    Chen, Sen
    Xue, Minhui
    Xu, Lihua
    MOBICOM'16: PROCEEDINGS OF THE 22ND ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2016, : 415 - 416
  • [9] Towards Multimodal Learning for Android Malware Detection
    McGiff, Josh
    Hatcher, William G.
    Nguyen, James
    Yu, Wei
    Blasch, Erik
    Lu, Chao
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 432 - 436
  • [10] Statistical Approach towards Malware Classification and Detection
    Ghanaei, Vida
    Iliopoulos, Costas S.
    Overill, Richard E.
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1093 - 1099