Analysis of Malware Behaviour: Using data Mining Clustering Techniques to Support Forensics Investigation

被引:10
作者
Edem, Edem Inang [1 ]
Benzaid, Chafika [2 ]
Al-Nemrat, Ameer [1 ]
Watters, Paul [3 ]
机构
[1] UEL, ACE Sch, London, England
[2] USTHB, Dept Comp Sci, Bab Ezzouar, Algeria
[3] Massey Univ, Sch Engn & Adv Technol, Palmerston North, New Zealand
来源
2014 5TH CYBERCRIME AND TRUSTWORTHY COMPUTING CONFERENCE CTC | 2014年
关键词
D O I
10.1109/CTC.2014.10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The proliferation of malware in recent times have accounted for the increase in computer crimes and prompted for a more aggressive research into improved investigative strategies, to keep up with the menace. Recent techniques and tools that have been developed and adopted to keep up in an arms race with malware authors who have resorted to the use of evasive techniques to avoid analysis during investigation is an on-going concern. Exploring dynamic analysis is unarguably, a positive step to supporting static evidence with malware dynamic behaviour logs. In view of this, analysing this huge generated reports raises concerns about speed, accuracy and performance. This research proposes an Automated Malware Investigative Framework Model, a component based approach that is designed to support investigation by integrating both malware analysis and data mining clustering techniques as part of an effort to solve the problem of overly generated reports. Thus, grouping analysed suspicious samples that exhibit similar behavioural features to make investigation easy and more intuitive. The focus of this paper however, is on implementing sub-components of the framework that directly deals with the problem at hand.
引用
收藏
页码:54 / 63
页数:10
相关论文
共 34 条
  • [1] Malicious Code Detection Using Penalized Splines on OPcode Frequency
    Alazab, Mamoun
    Al Kadiri, Mohammad
    Venkatraman, Sitalakshmi
    Al-Nemrat, Ameer
    [J]. 2012 THIRD CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2012), 2012, : 38 - 47
  • [2] AMORIM R C., 2012, 1 INT WORKSH CYB PAT, P47
  • [3] [Anonymous], 2005, MORGAN KAUFMANN SERI
  • [4] [Anonymous], 2012, Practical malware analysis: the hands-on guide to dissecting malicious software
  • [5] APEL M, 2009, P 34 IEEE C LOC COMP, P891
  • [6] Bailey M, 2007, LECT NOTES COMPUT SC, V4637, P178
  • [7] A CLUSTERING TECHNIQUE FOR SUMMARIZING MULTIVARIATE DATA
    BALL, GH
    HALL, DJ
    [J]. BEHAVIORAL SCIENCE, 1967, 12 (02): : 153 - &
  • [8] Bayer U., P 16 ANN NETW DISTR, V9, P8
  • [9] Brand M., 2010, THESIS
  • [10] Intelligent Choice of the Number of Clusters in K-Means Clustering: An Experimental Study with Different Cluster Spreads
    Chiang, Mark Ming-Tso
    Mirkin, Boris
    [J]. JOURNAL OF CLASSIFICATION, 2010, 27 (01) : 3 - 40