Static Malware Analysis Using Machine Learning Algorithms on APT1 Dataset with String and PE Header Features

被引:9
作者
Balram, Neil [1 ]
Hsieh, George [1 ]
McFall, Christian [1 ]
机构
[1] Norfolk State Univ, Comp Sci, Norfolk, VA 23504 USA
来源
2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019) | 2019年
关键词
machine learning; malware analysis; APT1; dataset; feature extraction;
D O I
10.1109/CSCI49370.2019.00022
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Static malware analysis is used to analyze executable files without executing the code to determine whether a file is malicious or not. Data analytic and machine learning techniques have been used increasingly to help process the large number of malware files circulating in the wild and detect new attacks. In this paper, we present the design and implementation of six different machine learning classifiers, and two distinct categories of features statically extracted from the executables: strings and Portable Executable header information. A total of twelve malware detectors were implemented for each of the six classifiers to operate with each of the two feature categories separately. These classifiers and feature extraction algorithms were implemented in Python using the scikit-learn machine learning library. The performances in detection accuracy and required processing time of the twelve malware detectors were compared and analyzed.
引用
收藏
页码:90 / 95
页数:6
相关论文
共 19 条
  • [1] [Anonymous], 2015, Microsoft malware classification challenge (big 2015)
  • [2] AV-Test Institute, Malware
  • [3] Opcodes as predictor for malware
    Bilar, Daniel
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (02) : 156 - 168
  • [4] Chio Clarence, 2018, Machine Learning and Security
  • [5] Gavrilu D., 2009, P INT MULT COMP SCI
  • [6] Imran M., 2016, TURKISH J ELECT ENG
  • [7] Kaspersky, 2021, MACH LEARN MALW DET
  • [8] Kumari M., 2017, 2017 INT C COMP SCI
  • [9] Mandiant, 2013, APT1 EXP ON CHIN CYB
  • [10] Mitchell TM, 1997, Mach. Learn., V1