An Approach for Detection and Family Classification of Malware Based on Behavioral Analysis

被引:0
作者
Hansen, Steven Strandlund [1 ]
Larsen, Thor Mark Tampus [1 ]
Stevanovic, Matija [1 ]
Pedersen, Jens Myrup [1 ]
机构
[1] Aalborg Univ, Dept Elect Syst, Aalborg, Denmark
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC) | 2016年
关键词
Malware; Dynamic Analysis; Malware Detection; Family Classification; Feature Selection; Random Forests;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malware, i.e., malicious software, represents one of the main cyber security threats today. Over the last decade malware has been evolving in terms of the complexity of malicious software and the diversity of attack vectors. As a result modern malware is characterized by sophisticated obfuscation techniques, which hinder the classical static analysis approach. Furthermore, the increased amount of malware that emerges every day, renders a manual approach inefficient. This study tackles the problem of analyzing, detecting and classifying the vast amount of malware in a scalable, efficient and accurate manner. We propose a novel approach for detecting malware and classifying it to either known or novel, i.e., previously unseen malware family. The approach relies on Random Forests classifier for performing both malware detection and family classification. Furthermore, the proposed approach employs novel feature representations for malware classification, that significantly reduces the feature space, while achieving encouraging predictive performance. The approach was evaluated using behavioral traces of over 270,000 malware samples and 837 samples of benign software. The behavioral traces were obtained using a modified version of Cuckoo sandbox, that was able to harvest behavioral traces of the analyzed samples in a time-efficient manner. The proposed system achieves high malware detection rate and promising predictive performance in the family classification, opening the possibility of coping with the use of obfuscation and the growing number of malware.
引用
收藏
页数:5
相关论文
共 12 条
  • [1] Random forests
    Breiman, L
    [J]. MACHINE LEARNING, 2001, 45 (01) : 5 - 32
  • [2] Fukushima Y., 2010, 2010 6th IEEE Workshop on Secure Network Protocols (NPSEC), P79, DOI 10.1109/NPSEC.2010.5634444
  • [3] Guyon I., 2006, Stud Fuzziness Soft Comput
  • [4] Hall M., 2009, SIGKDD EXPLORATIONS, V11, P10, DOI [DOI 10.1145/1656274.1656278, 10.1145/1656274.1656278]
  • [5] Hungenberg T., 2014, INETSIM INTERNET SER
  • [6] Microsoft, 2015, MICR THREAT ENC
  • [7] Pirscoveanu R., 2015, CYB SIT AW DAT AN AS
  • [8] Automatic analysis of malware behavior using machine learning
    Rieck, Konrad
    Trinius, Philipp
    Willems, Carsten
    Holz, Thorsten
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (04) : 639 - 668
  • [9] Ronghua Tian, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P23, DOI 10.1109/MALWARE.2010.5665796
  • [10] Salehi Z., 2012, 2012 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP), P563, DOI 10.1109/AISP.2012.6313810