Detection of Malicious Software by Analyzing Distinct Artifacts Using Machine Learning and Deep Learning Algorithms

被引:9
作者
Ashik, Mathew [1 ]
Jyothish, A. [1 ]
Anandaram, S. [1 ]
Vinod, P. [2 ]
Mercaldo, Francesco [3 ,4 ]
Martinelli, Fabio [3 ]
Santone, Antonella [4 ]
机构
[1] SCMS Sch Engn & Technol, Dept Comp Sci & Engn, Ernakulam 682011, India
[2] Cochin Univ Sci & Technol, Dept Comp Sci & Engn, Cochin 682001, Kerala, India
[3] Natl Res Council Italy, Inst Informat & Telemat, I-56124 Pisa, Italy
[4] Univ Molise, Dept Med & Hlth Sci Vincenzo Tiberio, I-86100 Campobasso, Italy
关键词
malware; machine learning; deep learning; static analysis; dynamic analysis; hybrid analysis; security; ANDROID MALWARE CHARACTERIZATION;
D O I
10.3390/electronics10141694
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware is one of the most significant threats in today's computing world since the number of websites distributing malware is increasing at a rapid rate. Malware analysis and prevention methods are increasingly becoming necessary for computer systems connected to the Internet. This software exploits the system's vulnerabilities to steal valuable information without the user's knowledge, and stealthily send it to remote servers controlled by attackers. Traditionally, anti-malware products use signatures for detecting known malware. However, the signature-based method does not scale in detecting obfuscated and packed malware. Considering that the cause of a problem is often best understood by studying the structural aspects of a program like the mnemonics, instruction opcode, API Call, etc. In this paper, we investigate the relevance of the features of unpacked malicious and benign executables like mnemonics, instruction opcodes, and API to identify a feature that classifies the executable. Prominent features are extracted using Minimum Redundancy and Maximum Relevance (mRMR) and Analysis of Variance (ANOVA). Experiments were conducted on four datasets using machine learning and deep learning approaches such as Support Vector Machine (SVM), Naive Bayes, J48, Random Forest (RF), and XGBoost. In addition, we also evaluate the performance of the collection of deep neural networks like Deep Dense network, One-Dimensional Convolutional Neural Network (1D-CNN), and CNN-LSTM in classifying unknown samples, and we observed promising results using APIs and system calls. On combining APIs/system calls with static features, a marginal performance improvement was attained comparing models trained only on dynamic features. Moreover, to improve accuracy, we implemented our solution using distinct deep learning methods and demonstrated a fine-tuned deep neural network that resulted in an F1-score of 99.1% and 98.48% on Dataset-2 and Dataset-3, respectively.
引用
收藏
页数:28
相关论文
共 49 条
[1]   Analysis and classification of context-based malware behavior [J].
Alaeiyan, Mohammadhadi ;
Parsa, Saeed ;
Conti, Mauro .
COMPUTER COMMUNICATIONS, 2019, 136 :76-90
[2]   A Dynamic Heuristic Method for Detecting Packed Malware Using Naive Bayes [J].
Alkhateeb, Ehab M. ;
Stamp, Mark .
2019 INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTING TECHNOLOGIES AND APPLICATIONS (ICECTA), 2019,
[3]   DL-Droid: Deep learning based android malware detection using real devices [J].
Alzaylaee, Mohammed K. ;
Yerima, Suleiman Y. ;
Sezer, Sakir .
COMPUTERS & SECURITY, 2020, 89
[4]  
[Anonymous], 2014, C4 5 PROGRAMS MACHIN
[5]  
[Anonymous], VNC VIEWER
[6]  
[Anonymous], WINDOWS API LIB
[7]  
[Anonymous], FACTORIAL ANOVA
[8]  
[Anonymous], 2021, IEEE Trans. Broadcast.
[9]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[10]  
Bergeron J., 1999, Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99), P184, DOI 10.1109/ENABL.1999.805197