User Behavior Analysis for Malware Detection

被引:1
作者
Dumitrasc, Valentina [1 ]
Serral-Gracia, Rene [2 ]
机构
[1] FSP Consulting Serv, Reading, Berks, England
[2] BarcelonaTech, Barcelona, Spain
来源
COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II | 2024年 / 14399卷
基金
欧盟地平线“2020”;
关键词
Machine Learning; Malware detection; User Behavior Analysis; Autoencoder;
D O I
10.1007/978-3-031-54129-2_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rise in cyber-attacks and cyber-crime is causing more and more organizations and individuals to consider the correct implementation of their security systems. The consequences of a security breach can be devastating, ranging from loss of public confidence to bankruptcy. Traditional techniques for detecting and stopping malware rely on building a database of known signatures using known samples of malware. However, these techniques are not very effective at detecting zero-day exploits because there are no samples in their malware signature databases. To address this challenge, our work proposes a novel approach to malware detection using machine learning techniques. Our solution provides a two-fold contribution, on the one hand, our training the model does not require any kind of malware, as it creates a user profile using only normal user behavior data, detecting malware by identifying deviations from this profile. On the other hand, as we shall see, our solution is able to dynamically train the model using only six sessions to minimize false positives. As a consequence, our model can quickly and effectively detect zero-day malware and other unknown threats without previous knowledge. The proposed approach is evaluated using real-world datasets, and different machine learning algorithms are compared to evaluate their performance in detecting unknown threats. The results show that the proposed approach is effective in detecting malware, achieving high accuracy and low false positive rates.
引用
收藏
页码:92 / 110
页数:19
相关论文
共 17 条
  • [1] Ahmed M.E., 2018, Medusa: malware detection using statistical analysis of system's behavior
  • [2] bazaar.abuse.ch, abuse.ch: Sha256 edfe81babf50c2506853fd8375f1be0b7bebbefb2-5e9a33eff95ec23e867 de1
  • [3] Brownlee J., 2020, A gentle introduction to the rectified linear unit (ReLU)
  • [4] Brownlee J, 2021, Gentle introduction to the adam optimization algorithm for deep learning
  • [5] Cyberwire T., signature-based detection
  • [6] AN INTRUSION-DETECTION MODEL
    DENNING, DE
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232
  • [7] Gavrilut Dragos, 2009, Proceedings of the 2009 International Multiconference on Computer Science and Information Technology (IMCSIT), P735, DOI 10.1109/IMCSIT.2009.5352759
  • [8] Griffiths C., 2023, The latest 2023 cyber crime statistics
  • [9] Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection
    Hindy, Hanan
    Atkinson, Robert
    Tachtatzis, Christos
    Colin, Jean-Noel
    Bayne, Ethan
    Bellekens, Xavier
    [J]. ELECTRONICS, 2020, 9 (10) : 1 - 16
  • [10] Lane Terran., 1997, An application of machine learning to anomaly detection