CADefender: Detection of unknown malicious AutoLISP computer-aided design files using designated feature extraction and machine learning methods

被引:0
作者
Yevsikov, Alexander [1 ,2 ]
Muralidharan, Trivikram [1 ,2 ]
Panker, Tomer [1 ,2 ]
Nissim, Nir [1 ,2 ]
机构
[1] Ben Gurion Univ Negev, Cyber Secur Res Ctr, Malware Lab, IL-8470912 Beer Sheva, Israel
[2] Ben Gurion Univ Negev, Dept Ind Engn & Management, IL-8410501 Beer Sheva, Israel
关键词
Computer-aided design; Auto list processing; Machine learning; Malware detection; Feature extraction; MALWARE DETECTION; CLASSIFICATION;
D O I
10.1016/j.engappai.2024.109414
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer-aided design (CAD) files are used to create digital designs for various structures - from the smallest chips in the high-tech industry to large-scale buildings and bridges in the civil engineering space. We found that most exploits and malicious payloads are deployed through Auto List Processing (AutoLISP) source code (LSP) or Fast Load AutoLISP (FAS) files, which are non-executable files (NEFs) containing scripts in the AutoLISP language that are native to AutoCAD; While antivirus software is capable of detecting many malicious CAD files, the potential to improve protection by using a dedicated machine learning (ML) based detection solution remains, especially against unknown and sophisticated CAD malware. In this study, we are the first to propose designated feature extraction methods and a robust framework aimed at the detection of known and unknown AutoLISP malware using ML algorithms. To accomplish this, we examined the structure, functionality, and ecosystems of AutoLISP files and collected the largest known representative collection of LSP files consisting of 6418 malicious and benign files (labeled and verified). We then explored the use of two novel static-analysis-based feature extraction methods (knowledge-based and structural) designated for LSP files to extract a discriminative set of informative features, which can subsequently be used by ML models to detect malicious LSP files. These two feature extraction methods serve as the basis of the proposed detection framework, whose performance we comprehensively compare to both widely used antiviruses and baseline ML models based on existing feature extraction methods, including MinHash, Bidirectional Encoder Representations from Transformers (BERT), and n-gram. Our results highlight our methods' contributions to the detection of unknown AutoLISP malware and demonstrate their ability to outperform existing methods. The best performance in the task of unknown malicious LSP file detection was obtained by the Artificial Neural Networks (ANN) model trained on 100 knowledgebased features, which obtained a true positive rate (TPR) of 99.49% with a false positive rate (FPR) of 0.57%. Our framework's role in explainability is also highlighted, as we also present the prominent features that contribute most to the model's detection capabilities; this information can be used for explainability purposes. We conclude by evaluating the proposed framework's ability to detect a malicious file from an unknown AutoLISP malware family and by evaluating our framework on an additional independent test set that originated from another source, scenarios that are often faced by malware detection solutions.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods
    Cohen, Aviad
    Nissim, Nir
    Rokach, Lior
    Elovici, Yuval
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 63 : 324 - 343
  • [2] A method of version merging for computer-aided design files based on feature extraction
    Sun, C.
    Guo, D.
    Gao, H.
    Zou, L.
    Wang, H.
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART C-JOURNAL OF MECHANICAL ENGINEERING SCIENCE, 2011, 225 (C2) : 463 - 471
  • [3] Computer-aided Diagnostics of Schizophrenia: Comparison of Different Feature Extraction Methods
    Radomir, Kus
    Daniel, Schwarz
    ACTA POLYTECHNICA HUNGARICA, 2017, 14 (05) : 181 - 196
  • [4] ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology
    Nissim, Nir
    Cohen, Aviad
    Elovici, Yuval
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 631 - 646
  • [5] Using machine learning to predict engineering technology students' success with computer-aided design
    Singh, Jasmine
    Perera, Viranga
    Magana, Alejandra J.
    Newell, Brittany
    Wei-Kocsis, Jin
    Seah, Ying Ying
    Strimel, Greg J.
    Xie, Charles
    COMPUTER APPLICATIONS IN ENGINEERING EDUCATION, 2022, 30 (03) : 852 - 862
  • [6] Neonates Crying Detection Through Feature Extraction and Machine Learning Methods
    Nunez-Calvo, Lucia
    Velasco-Perez, Nuria
    Lozano-Juarez, Samuel
    Herrero, Alvaro
    Arnaez, Juan
    Urda, Daniel
    HYBRID ARTIFICIAL INTELLIGENT SYSTEM, PT I, HAIS 2024, 2025, 14857 : 275 - 285
  • [7] Machine Learning Methods for Computer-Aided Breast Cancer Diagnosis Using Histopathology: A Narrative Review
    Saxena, Shweta
    Gyanchandani, Manasi
    JOURNAL OF MEDICAL IMAGING AND RADIATION SCIENCES, 2020, 51 (01) : 182 - 193
  • [8] Boosting the Detection of Malicious Documents Using Designated Active Learning Methods
    Nissim, Nir
    Cohen, Aviad
    Elovici, Yuval
    2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, : 760 - 765
  • [9] The effect of feature selection methods on computer-aided detection of masses in mammograms
    Hupse, Rianne
    Karssemeijer, Nico
    PHYSICS IN MEDICINE AND BIOLOGY, 2010, 55 (10) : 2893 - 2904
  • [10] Developments in the detection of diabetic retinopathy: a state-of-the-art review of computer-aided diagnosis and machine learning methods
    Selvachandran, Ganeshsree
    Quek, Shio Gai
    Paramesran, Raveendran
    Ding, Weiping
    Son, Le Hoang
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (02) : 915 - 964