Machine-Learning-Based Malware Detection for Virtual Machine by Analyzing Opcode Sequence

被引:1
作者
Wang, Xiao [1 ,2 ]
Zhang, Jianbiao [1 ,2 ]
Zhang, Ai [3 ]
机构
[1] Beijing Univ Technol, Fac Informat, Beijing, Peoples R China
[2] Beijing Key Lab Trusted Comp, Beijing, Peoples R China
[3] Beijing Univ Technol, Beijing Dublin Int Coll, Beijing, Peoples R China
来源
ADVANCES IN BRAIN INSPIRED COGNITIVE SYSTEMS, BICS 2018 | 2018年 / 10989卷
关键词
Machine learning; Malware detection; Virtual machine introspection; Cloud security;
D O I
10.1007/978-3-030-00563-4_70
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of cloud computing, cloud security is increasingly an important issue. Virtual machine (VM) is the main form to provide cloud service. To protect VMs against malware attack, a cloud needs to have the ability to react not only to known malware, but also to the new emerged ones. Virtual Machine Introspection (VMI) is a good solution for VM monitoring, which can obtain the raw memory state of the VM at Virtual Machine Monitor (VMM) level. Through analyzing the memory dumps, the significant features of malware can be obtained. In our research, we propose a novel static analysis method for unknown malware detection based on the feature of opcode n-gram of the executable files. Different feature sizes ranging from 2-gram to 4-gram are implemented with the feature length of 100, 200, 300 respectively. The feature selection criterion of Term Frequency (TF)-Inverse Document Frequency (IDF) and Information Gain (IG) are leveraged to extract the top features for classifier training. Different classifiers are trained with the preprocessed dataset. The experimental results show that the weighted integrated classifier with opcode 4-gram of 300 features has the optimal accuracy of 98.2%.
引用
收藏
页码:717 / 726
页数:10
相关论文
共 22 条
  • [1] [Anonymous], 2016, 2016 IEEE Symposium on Technologies for Homeland Security (HST), DOI DOI 10.1109/THS.2016.7568881
  • [2] Improving malware detection using multi-view ensemble learning
    Bai, Jinrong
    Wang, Junfeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4227 - 4241
  • [3] Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection
    Dolan-Gavitt, Brendan
    Leek, Tim
    Zhivich, Michael
    Giffin, Jonathon
    Lee, Wenke
    [J]. 2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 297 - 312
  • [4] Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection
    Fu, Yangchun
    Lin, Zhiqiang
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2013, 16 (02)
  • [5] Garfinkel T., 2003, P NETW DISTR SYST SE, P1
  • [6] SoK: Introspections on Trust and the Semantic Gap
    Jain, Bhushan
    Baig, Mirza Basim
    Zhang, Dongli
    Porter, Donald E.
    Sion, Radu
    [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 605 - 620
  • [7] Kang B, 2016, 2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY)
  • [8] Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM
    Kumara, Ajay M. A.
    Jaidhar, C. D.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 79 : 431 - 446
  • [9] Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor
    Kumara, M. A. Ajay
    Jaidhar, C. D.
    [J]. DIGITAL INVESTIGATION, 2017, 23 : 99 - 123
  • [10] libvmi, LIBVMI HOMEPAGE