Dynamic Malware Analysis Based on API Sequence Semantic Fusion

被引:8
作者
Zhang, Sanfeng [1 ,2 ]
Wu, Jiahao [1 ]
Zhang, Mengzhe [1 ]
Yang, Wang [1 ,2 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211189, Peoples R China
[2] Southeast Univ, Key Lab Comp Network & Informat Integrat, Minist Educ, Nanjing 211189, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 11期
关键词
malware; dynamic analysis; API call sequence; semantic feature; fusion; LEARNING APPROACH; CLASSIFICATION;
D O I
10.3390/app13116526
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The existing dynamic malware detection methods based on API call sequences ignore the semantic information of functions. Simply mapping API to numerical values does not reflect whether a function has performed a query or modification operation, whether it is related to network communication, the file system, or other factors. Additionally, the detection performance is limited when the size of the API call sequence is too large. To address this issue, we propose Mal-ASSF, a novel malware detection model that fuses the semantic and sequence features of the API calls. The API2Vec embedding method is used to obtain the dimensionality reduction representation of the API function. To capture the behavioral features of sequential segments, Balts is used to extract the features. To leverage the implicit semantic information of the API functions, the operation and the type of resource operated by the API functions are extracted. These semantic and sequential features are then fused and processed by the attention-related modules. In comparison with the existing methods, Mal-ASSF boasts superior capabilities in terms of semantic representation and recognition of critical sequences within API call sequences. According to the evaluation with a dataset of malware families, the experimental results show that Mal-ASSF outperforms existing solutions by 3% to 5% in detection accuracy.
引用
收藏
页数:16
相关论文
共 37 条
  • [1] DL-FHMC: Deep Learning-Based Fine-Grained Hierarchical Learning Approach for Robust Malware Classification
    Abusnaina, Ahmed
    Abuhamad, Mohammed
    Alasmary, Hisham
    Anwar, Afsah
    Jang, Rhongho
    Salem, Saeed
    Nyang, Daehun
    Mohaisen, David
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3432 - 3447
  • [2] When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features
    Aghakhani, Hojjat
    Gritti, Fabio
    Mecca, Francesco
    Lindorfer, Martina
    Ortolani, Stefano
    Balzarotti, Davide
    Vigna, Giovanni
    Krueger, Christopher
    [J]. 27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [3] Agrawal R, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), P2656, DOI 10.1109/ICASSP.2018.8461583
  • [4] Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
    Al-rimy, Bander Ali Saleh
    Maarof, Mohd Aizaini
    Shaid, Syed Zainudeen Mohd
    [J]. COMPUTERS & SECURITY, 2018, 74 : 144 - 166
  • [5] A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence
    Amer, Eslam
    Zelinka, Ivan
    [J]. COMPUTERS & SECURITY, 2020, 92
  • [6] [Anonymous], 2021, ALIBABA CLOUD MALWAR
  • [7] [Anonymous], 2021, MCAFEE LABS THREATS
  • [8] [Anonymous], 2020, VIRUSTOTAL FILE STAT
  • [9] Using API Calls for Sequence-Pattern Feature Mining-Based Malware Detection
    Balan, Gheorghe
    Gavrilut, Dragos Teodor
    Luchian, Henri
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 233 - 251
  • [10] A cost analysis of machine learning using dynamic runtime opcodes for malware detection
    Carlin, Domhnall
    O'Kane, Philip
    Sezer, Sakir
    [J]. COMPUTERS & SECURITY, 2019, 85 : 138 - 155