GooseBt: A programmable malware detection framework based on process, file, registry, and COM monitoring

被引:8
作者
Yang, Yuer [1 ,2 ]
Lin, Yifeng [1 ]
Li, Zhiying [1 ]
Zhao, Liangtian [1 ]
Yao, Mengting [3 ]
Lai, Yixi [3 ]
Li, Peiya [1 ]
机构
[1] Jinan Univ, Coll Cyber Secur, Guangzhou 511436, Peoples R China
[2] Jinan Univ, Sch Econ, Guangzhou 510632, Peoples R China
[3] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Peoples R China
关键词
Programmable framework; Malware detection; Dynamic rules; Static rules;
D O I
10.1016/j.comcom.2023.03.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the networks is becoming faster and more convenient, computers is communicating with each other more and more frequent. However, security of computer communication is required to be concerned. Thus, this paper introduces a new programmable malware detection framework under Windows platform named GooseBt based on process, file, registry, and COM monitoring, which provides a new thought to perform malware detection. Usually, it is quite difficult to design with various kernel drivers on different platform versions, which are required to be developed before malware detection methods could be addressed. Moreover, most kinds of the existing anti-virus software are not programmable. In GooseBt framework, users can directly use easy codes to design their malware detection methods and make it run in Windows kernel mode. Static rules and dynamic rules are provided as interfaces based on message mapping. Moreover, third-party anti-virus manufacturers can directly call the API of the framework. The framework is proved to be effective and stable.
引用
收藏
页码:24 / 32
页数:9
相关论文
共 27 条
[1]  
Aufa Endroyono F. J., 2018, P 2018 4 INT C SCI T, V1, P1
[2]   A virus detection framework based on SPMOS [J].
Chen, Tianzhou ;
Ma, Jijun ;
Zhang, Nan ;
Shi, Qingsong .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2008, :610-615
[3]   Dynamic VSA: a framework for malware detection based on register contents [J].
Ghiasi, Mahboobe ;
Sami, Ashkan ;
Salehi, Zahra .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2015, 44 :111-122
[4]   Digital signature: use and modification to achieve success in next generational e-business processes [J].
Gupta, A ;
Tung, YA ;
Marsden, JR .
INFORMATION & MANAGEMENT, 2004, 41 (05) :561-575
[5]  
Hasan MM, 2017, 2017 20TH INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATION TECHNOLOGY (ICCIT)
[6]   A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems [J].
Huang, Linan ;
Zhu, Quanyan .
COMPUTERS & SECURITY, 2020, 89
[7]   Hybrids of support vector machine wrapper and filter based framework for malware detection [J].
Huda, Shamsul ;
Abawajy, Jemal ;
Alazab, Mamoun ;
Abdollalihian, Mali ;
Islam, Rafiqul ;
Yearwood, John .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :376-390
[8]  
Iqbal MS, 2016, IEEE WCNC
[9]  
Khalique A., 2010, Int J Comput Appl, V2, P21
[10]  
Lennon J., 2009, Beginning CouchDB, P87, DOI [10.1007/978-1-4302-7236-6, DOI 10.1007/978-1-4302-7236-6]