Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis

被引:13
作者
Kozachok, A. V. [1 ]
Kozachok, V. I. [1 ]
机构
[1] Acad Fed Guard Serv, Oryol, Russia
关键词
Anti-virus protection; Malware; Neural networks; Decision trees; Heuristic analysis; Machine learning;
D O I
10.1007/s11416-017-0309-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper presents the application justification of a new set of features collected at the stage of the static analysis of the executable files to address the problem of malicious code detection. In the course of study the following problems were solved: the development of the executable files classifier in the absence of a priori data concerning their functionality; designing the class models of uninfected files and malware during the learning process; the development of malicious code detection procedure using the neural networks mathematical apparatus and decision tree composition relating to the set of features specified on the basis of the executable files static analysis. The paper contains the results of experimental evaluation of the developed detection mechanism efficiency on the basis of neural networks (accuracy was 0.99125) and decision tree composition (accuracy was 0.99240). The obtained data confirmed the hypothesis about the possibility of constructing the heuristic malware analyzer on the basis of features selected during the static analysis of the executable files.
引用
收藏
页码:225 / 231
页数:7
相关论文
共 13 条
[1]  
AV-Comparatives, 2017, MALW PROT TEST
[2]  
Buitinck L, 2013, ECML PKDD WORKSH LAN, P108, DOI DOI 10.48550/ARXIV.1309.0238
[3]   Structural analysis of binary executable headers for malware detection optimization [J].
David, Baptiste ;
Filiol, Eric ;
Gallienne, Kévin .
Journal of Computer Virology and Hacking Techniques, 2017, 13 (02) :87-93
[4]  
Federal Service for Technology and Export Control, 2012, INF REP ANT SOFTW RE
[5]  
Kingma D.P., 2015, P INT C LEARN REPR I
[6]  
Kozachok A.V, 2012, VESTNIK SIBGUTI, V3, P29
[7]  
Ochsenmeier M, 2017, PESTUDIO MALWARE INI
[8]  
Santos I, 2013, ADV INTELL SYST COMP, V189, P271
[9]  
Schmid H., 1994, PROBABILISTIC PART O
[10]  
Shabtai Asaf, 2009, Information Security Technical Report, V14, P16, DOI 10.1016/j.istr.2009.03.003