Maximizing accuracy in multi-scanner malware detection systems

被引:9
作者
Sakib, Muhammad N. [1 ]
Huang, Chin-Tser [1 ]
Lin, Ying-Dar [2 ]
机构
[1] Univ South Carolina, Dept Comp Sci & Engn, Columbia, SC 29208 USA
[2] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 30010, Taiwan
关键词
Multi-scanner; Modeling; Malware detection; Accuracy; HYBRID ANALYSIS;
D O I
10.1016/j.comnet.2019.107027
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A variety of anti-malware scanners have been developed for malware detection. Previous research has indicated that combining multiple different scanners can achieve better result compared to any single scanner. However, given the diversity in detection rates and accuracy of different anti-malware scanners, how to determine the best possible outcome of multi-scanner systems in terms of accuracy and how to achieve this best outcome remain formidable tasks. In this paper, we propose three models to capture the combined output of different combinations of anti-malware scanners based on the limited amount of historical information available. These models enable us to predict the accuracy level of each combination, which helps us to determine the optimal configuration of the multi-scanner detection system to achieve maximum accuracy. We also introduce two methods to identify a near-optimal subset of scanners that can help reduce scanning cost while under time constraint. From simulations over randomly generated hypothetical datasets and experiments conducted with real world malware and goodware datasets and anti-virus scanners, we found that our models perform well in predicting the optimal configuration and can achieve an accuracy as high as within 1% of true maximum. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:16
相关论文
共 46 条
[1]  
Aldini A., 2015, CONCURRENCY COMPUTAT
[2]  
Algaith A., 2016, P 46 ANN IEEE IFIP I
[3]   Hidden Markov models for malware classification [J].
Annachhatre, Chinmayee ;
Austin, Thomas H. ;
Stamp, Mark .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (02) :59-73
[4]  
[Anonymous], P 17 USENIX SEC S
[5]   Profile hidden Markov models and metamorphic virus detection [J].
Attaluri, Srilatha ;
McGhee, Scott ;
Stamp, Mark .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2009, 5 (02) :151-169
[6]   Countering Android Malware: A Scalable Semi-Supervised Approach for Family-Signature Generation [J].
Atzeni, Andrea ;
Diaz, Fernando ;
Marcelli, Andrea ;
Sanchez, Antonio ;
Squillero, Giovanni ;
Tonda, Alberto .
IEEE ACCESS, 2018, 6 :59540-59556
[7]  
Bayer U., 2009, Scalable, behavior-based malware clustering
[8]  
Charlton J., 2018, P IEEE MIL COMM C MI
[9]  
Chen L, 2019, ARXIV190500122
[10]  
Chiriac Mihai., 2009, Virus Bulletin Conference, P1