Static and Dynamic Malware Analysis Using Machine Learning

被引:0
作者
Ijaz, Muhammad [1 ]
Durad, Muhammad Hanif [1 ]
Ismail, Maliha [2 ]
机构
[1] Pakistan Inst Engn & Appl Sci, Dept Comp & Informat Sci, Islamabad, Pakistan
[2] CESAT, Islamabad, Pakistan
来源
PROCEEDINGS OF 2019 16TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST) | 2019年
关键词
Malwares; Cuckoo Sandbox; binary; static Analysis; Dynamic Analysis; Machine Learning; obfuscate; evade;
D O I
10.1109/ibcast.2019.8667136
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Malware detection is an indispensable factor in security of internet oriented machines. The combinations of different features are used for dynamic malware analysis. The different combinations are generated from APIs, Summary Information, DLLs and Registry Keys Changed. Cuckoo sandbox is used for dynamic malware analysis, which is customizable, and provide good accuracy. More than 2300 features are extracted from dynamic analysis of malware and 92 features are extracted statically from binary malware using PEFILE. Static features are extracted from 39000 malicious binaries and 10000 benign files. Dynamically 800 benign files and 2200 malware files are analyzed in Cuckoo Sandbox and 2300 features are extracted. The accuracy of dynamic malware analysis is 94.64% while static analysis accuracy is 99.36%. The dynamic malware analysis is not effective due to tricky and intelligent behaviours of malwares. The dynamic analysis has some limitations due to controlled network behavior and it cannot be analyzed completely due to limited access of network.
引用
收藏
页码:687 / 691
页数:5
相关论文
共 10 条
[1]  
Alazab M., 2011, P AUSDM, V121, P171, DOI DOI 10.5555/2483628.2483648
[2]  
[Anonymous], ARXIV14102131
[3]  
Chowdhury Mozammel., 2017, International Conference on Applications and Techniques in Cyber Security and Intelligence, P266
[4]  
Chumachenko K., 2017, Machine Learning Methods for Malware Detection and Classification
[5]   Structural analysis of binary executable headers for malware detection optimization [J].
David, Baptiste ;
Filiol, Eric ;
Gallienne, Kévin .
Journal of Computer Virology and Hacking Techniques, 2017, 13 (02) :87-93
[6]  
Jain A., 2017, 2017 2 INT C TELECOM, P1
[7]  
Kolbitsch Clemens, 2009, USENIX Security, P351, DOI DOI 10.1093/MP/SSQ045
[8]  
Kolosnjaji Bojan, 2016, AI 2016: Advances in Artificial Intelligence. 29th Australasian Joint Conference. Proceedings: LNAI 9992, P137, DOI 10.1007/978-3-319-50127-7_11
[9]  
Santos I, 2013, ADV INTELL SYST COMP, V189, P271
[10]  
Tzu-Yen Wang, 2009, Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC, P278, DOI 10.1109/NCM.2009.385