Malware classification based on API calls and behaviour analysis

被引:50
作者
Pektas, Abdurrahman [1 ]
Acarman, Tankut [1 ]
机构
[1] Galatasaray Univ, Dept Comp Engn, Ciragan Cad 36, TR-34349 Istanbul, Turkey
关键词
learning (artificial intelligence); data mining; application program interfaces; pattern classification; invasive software; malware classification accuracy; baseline classifiers; online machine learning algorithms; classification model; malicious API pattern extraction; Voting Experts algorithm; behaviour-based features; API call sequences; n-gram; mining; application programming interface call; Windows malware; runtime behaviour-based classification procedure; behaviour analysis; malware classification;
D O I
10.1049/iet-ifs.2017.0430
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study presents the runtime behaviour-based classification procedure for Windows malware. Runtime behaviours are extracted with a particular focus on the determination of a malicious sequence of application programming interface (API) calls in addition to the file, network and registry activities. Mining and searching n-gram over API call sequences is introduced to discover episodes representing behaviour-based features of a malware. Voting Experts algorithm is used to extract malicious API patterns over API calls. The classification model is built by applying online machine learning algorithms and compared with the baseline classifiers. The model is trained and tested with a fairly large set of 17,400 malware samples belonging to 60 distinct families and 532 benign samples. The malware classification accuracy is reached at 98%.
引用
收藏
页码:107 / 117
页数:11
相关论文
共 32 条
  • [1] AN INTRODUCTION TO KERNEL AND NEAREST-NEIGHBOR NONPARAMETRIC REGRESSION
    ALTMAN, NS
    [J]. AMERICAN STATISTICIAN, 1992, 46 (03) : 175 - 185
  • [2] [Anonymous], 2009, SIGKDD Explorations, DOI DOI 10.1145/1656274.1656278
  • [3] [Anonymous], 2013, LECT NOTES COMPUT SC
  • [4] [Anonymous], 2008, Proceedings of the 25th international conference on Machine learning, DOI DOI 10.1145/1390156.1390190
  • [5] [Anonymous], IEEE 11 INT C DAT MI
  • [6] [Anonymous], 2016, Internet security threat report
  • [7] [Anonymous], TECH REP
  • [8] [Anonymous], DTIC DOCUMENT
  • [9] [Anonymous], 2016, CORR
  • [10] [Anonymous], 1996, Proceedings of 1996 IEEE Symposium on Security and Privacy, DOI DOI 10.1109/SECPRI.1996.502675