A malware classification method based on memory dump grayscale image

被引:79
作者
Dai, Yusheng [1 ]
Li, Hui [1 ]
Qian, Yekui [2 ]
Lu, Xidong [1 ]
机构
[1] Northwestern Polytech Univ, Sch Elect & Informat, Xian, Shaanxi, Peoples R China
[2] 24 Jianshedong Rd, Zhengzhou 450052, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Dynamic analysis; Hardware features; Memory dump; Malware classification;
D O I
10.1016/j.diin.2018.09.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Effective analysis of malware is of great significance in guaranteeing the reliability of the system operation. Malware can easily escape from existing dynamic analysis methods. Aiming at the deficiencies of current methods for detecting malware dynamically, a method of using hardware features is proposed, namely, a memory dump file is extracted and converted into a grayscale image, the image is converted into a fixed size, and the image feature is extracted using histogram of gradient, and the currently popular classifier algorithm is used to classify malware. Experiments are conducted using actual malware samples and the effectiveness of using memory dump file image is verified. This method is superior to the recently proposed hardware performance counter detection method. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:30 / 37
页数:8
相关论文
共 25 条
[1]  
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[2]  
[Anonymous], 2011, P 8 INT S VIS CYB SE
[3]  
Arp D, 2014, NETW DISTR SYST SEC
[4]   Detecting objective-C malware through memory forensics [J].
Case, Andrew ;
Richard, Golden G., III .
Digital Investigation, 2016, 18 :S3-S10
[5]   Histograms of oriented gradients for human detection [J].
Dalal, N ;
Triggs, B .
2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, :886-893
[6]  
Demme J., 2013, ACM SIGARCH computer architecture news, V41, P559, DOI 10.1145/2485922
[7]   A Survey on Automated Dynamic Malware-Analysis Techniques and Tools [J].
Egele, Manuel ;
Scholte, Theodoor ;
Kirda, Engin ;
Kruegel, Christopher .
ACM COMPUTING SURVEYS, 2012, 44 (02)
[8]  
Feng Y., AUTOMATED SYNTHESIS
[9]  
Idika Nwokedi., 2007, SURVEY MALWARE DETEC
[10]  
Javaheri D, 2017, WIRELESS PERS COMMUN, V98, P1