Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification

被引:216
作者
Ahmadi, Mansour [1 ]
Ulyanov, Dmitry [2 ]
Semenov, Stanislav [3 ]
Trofimov, Mikhail [4 ]
Giacinto, Giorgio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, I-09124 Cagliari, Italy
[2] Skolkovo Inst Sci & Technol, Moskovsky, Russia
[3] Natl Res Univ, Higher Sch Econ, Moscow, Russia
[4] Moscow Inst Phys & Technol, Dolgoprudnyi, Moskovskaya Obl, Russia
来源
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY | 2016年
关键词
Windows Malware; Machine learning; Malware family; Computer security; Classification; Microsoft Malware Classification Challenge; ENTROPY;
D O I
10.1145/2857705.2857713
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern malware is designed with mutation characteristics, namely polymorphism and metamorphism, which causes an enormous growth in the number of variants of malware samples. Categorization of malware samples on the basis of their behaviors is essential for the computer security community, because they receive huge number of malware everyday, and the signature extraction process is usually based on malicious parts characterizing malware families. Microsoft released a malware classification challenge in 2015 with a huge dataset of near 0.5 terabytes of data, containing more than 20K malware samples. The analysis of this dataset inspired the development of a novel paradigm that is effective in categorizing malware variants into their actual family groups. This paradigm is presented and discussed in the present paper, where emphasis has been given to the phases related to the extraction, and selection of a set of novel features for the effective representation of malware samples. Features can be grouped according to different characteristics of malware behavior, and their fusion is performed according to a per-class weighting paradigm. The proposed method achieved a very high accuracy (approximate to 0.998) on the Microsoft Malware Challenge dataset.
引用
收藏
页码:183 / 194
页数:12
相关论文
共 45 条
[1]  
Ahmadi M, 2013, COMPUT FRAUD SECUR, P11, DOI 10.1016/S1361-3723(13)70072-1
[2]  
[Anonymous], 2014, INTRO STAT LEARNING
[3]  
[Anonymous], 2010, P ACM S APPL COMP
[4]  
[Anonymous], 2015, SYMANTEC INTELLIGENT
[5]  
[Anonymous], 2009, USENIX Security, DOI DOI 10.1093/MP/SSQ045
[6]  
[Anonymous], 2011, INT S VISUALIZATION
[7]  
[Anonymous], 2015, TOP MALICIOUSLY USED
[8]  
[Anonymous], 2015, DUQU IS BACK
[9]  
[Anonymous], 2015, MAHOTAS FEATURES
[10]  
[Anonymous], P 14 C USENIX SEC S