PDF Malware Detection Based on Optimizable Decision Trees

被引:23
作者
Abu Al-Haija, Qasem [1 ]
Odeh, Ammar [2 ]
Qattous, Hazem [3 ]
机构
[1] Princess Sumaya Univ Technol PSUT, Dept Cybersecur, Amman 11941, Jordan
[2] Princess Sumaya Univ Technol PSUT, Dept Comp Sci, Amman 11941, Jordan
[3] Princess Sumaya Univ Technol PSUT, Dept Software Engn, Amman 11941, Jordan
关键词
portable document format (PDF); machine learning; detection; optimizable decision tree; AdaBoost; PDF malware; evasion attacks; cybersecurity;
D O I
10.3390/electronics11193142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Portable document format (PDF) files are one of the most universally used file types. This has incentivized hackers to develop methods to use these normally innocent PDF files to create security threats via infection vector PDF files. This is usually realized by hiding embedded malicious code in the victims' PDF documents to infect their machines. This, of course, results in PDF malware and requires techniques to identify benign files from malicious files. Research studies indicated that machine learning methods provide efficient detection techniques against such malware. In this paper, we present a new detection system that can analyze PDF documents in order to identify benign PDF files from malware PDF files. The proposed system makes use of the AdaBoost decision tree with optimal hyperparameters, which is trained and evaluated on a modern inclusive dataset, viz. Evasive-PDFMal2022. The investigational assessment demonstrates a lightweight and accurate PDF detection system, achieving a 98.84% prediction accuracy with a short prediction interval of 2.174 mu Sec. To this end, the proposed model outperforms other state-of-the-art models in the same study area. Hence, the proposed system can be effectively utilized to uncover PDF malware at a high detection performance and low detection overhead.
引用
收藏
页数:18
相关论文
共 66 条
[21]  
Atkinson S., 2021, Digital forensic investigation of Internet of Things (IoT) Devices, P65, DOI [DOI 10.1007/978-3-030-60425-7_4, 10.1007/978-3-030-60425-7_4]
[22]   A Survey on malware analysis and mitigation techniques [J].
Chakkaravarthy, S. Sibi ;
Sangeetha, D. ;
Vaidehi, V. .
COMPUTER SCIENCE REVIEW, 2019, 32 :1-23
[23]  
Chen YZ, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P2343
[24]  
Contagio M.P., 2011, CONTAGIODUMP
[25]  
Corona I., 2014, P 2014 WORKSH ART IN
[26]   Robust PDF Malware Detection with Image Visualization and Processing Techniques [J].
Corum, Andrew ;
Jenkins, Donovan ;
Zheng, Jun .
2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, :108-114
[27]  
Cuan B., 2018, P SECRYPT 2018 15 IN
[28]   Improving malicious PDF classifier with feature engineering: A data-driven approach [J].
Falah, Ahmed ;
Pan, Lei ;
Huda, Shamsul ;
Pokhrel, Shiva Raj ;
Anwar, Adnan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 :314-326
[29]   A novel method for malware detection based on hardware events using deep neural networks [J].
Ghanei, Hadis ;
Manavi, Farnoush ;
Hamzeh, Ali .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2021, 17 (04) :319-331
[30]   Detection of Malicious PDF Files Using a Two-Stage Machine Learning AlgorithmInspec keywordsOther keywordsKey words [J].
He, Kang ;
Zhu, Yuefei ;
He, Yubo ;
Liu, Long ;
Lu, Bin ;
Lin, Wei .
CHINESE JOURNAL OF ELECTRONICS, 2020, 29 (06) :1165-1177