Detection and Elimination of Spyware and Ransomware by Intercepting Kernel-Level System Routines

被引:42
作者
Javaheri, Danial [1 ]
Hosseinzadeh, Mehdi [2 ,3 ]
Rahmani, Amir Masoud [1 ]
机构
[1] Islamic Azad Univ, Sci & Res Branch, Dept Comp Engn, Tehran 1477893855, Iran
[2] Univ Human Dev, Dept Comp Sci, Sulaimaniyah 07786, Iraq
[3] Iran Univ Med Sci, Int Campus, Tehran 1449614535, Iran
关键词
Malware analysis; spyware detection; stealth; obfuscation; data mining; MALWARE; CLASSIFICATION;
D O I
10.1109/ACCESS.2018.2884964
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spyware is the most complex, obfuscated, and targeted class of malware, which has grown dramatically in recent years. Spyware is designed for secret, long-term, and persistent missions. This paper provides a novel method for detection, tracking, and confronting the stealth and obfuscated spyware and ransomware, including keyloggers, screen recorders, and blockers. The proposed method of this paper is based on a dynamic behavioral analysis through deep and transparent hooking of kernel-level routines. We used linear regression, JRIP, and J48 decision tree algorithms as a classifier to recognize three classes of malware. This paper presents the main architectural plan of an anti-spyware application to track spyware footprints in order to detect and force terminate running processes, eliminate executable files, and restrict network communications. The efficiency of the proposed method was evaluated from the viewpoint of accuracy in detecting real-world samples of spyware by ROC curve analysis and from the viewpoint of success rate to confront effectively with active spyware. Our proposed method was able to recognize spyware with an accuracy of about 93% and an error rate near 7%. In addition, the proposed system can disinfect an operating system from infection by spyware with a hit rate of about 82%.
引用
收藏
页码:78321 / 78332
页数:12
相关论文
共 31 条
[1]  
[Anonymous], INT SEC THREAT REP 2
[2]   SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System [J].
Arshad, Saba ;
Shah, Munam A. ;
Wahid, Abdul ;
Mehmood, Amjad ;
Song, Houbing ;
Yu, Hongnian .
IEEE ACCESS, 2018, 6 :4321-4339
[3]   Statistical fingerprint-based intrusion detection system (SF-IDS) [J].
Boero, Luca ;
Cello, Marco ;
Marchese, Mario ;
Mariconti, Enrico ;
Naqash, Talha ;
Zappatore, Sandro .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (10)
[4]   The Effects of Traditional Anti-Virus Labels on Malware Detection Using Dynamic Runtime Opcodes [J].
Carlini, Domhnall ;
Cowan, Alexandra ;
O'Kane, Philip ;
Sezer, Sakir .
IEEE ACCESS, 2017, 5 :17742-17752
[5]   A generic anti-spyware solution by access control list at kernel level [J].
Chow, SSM ;
Hui, LCK ;
Yiu, SM ;
Chow, KP ;
Lui, RWC .
JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 75 (1-2) :227-234
[6]   Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware [J].
Das, Sanjeev ;
Liu, Yang ;
Zhang, Wei ;
Chandramohan, Mahintham .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) :289-302
[7]   An Android Malware Detection Approach Using Community Structures of Weighted Function Call Graphs [J].
Du, Yao ;
Wang, Junfeng ;
Li, Qi .
IEEE ACCESS, 2017, 5 :17478-17486
[8]  
Gupta S., 2014, WIRELESS PERS COMMUN, V81, P405
[9]   Revolution of securities law in the Internet Age: A review on equity crowd-funding [J].
Huang, Tao ;
Zhao, Yuan .
COMPUTER LAW & SECURITY REVIEW, 2017, 33 (06) :802-810
[10]   Classification of malware based on integrated static and dynamic features [J].
Islam, Rafiqul ;
Tian, Ronghua ;
Batten, Lynn M. ;
Versteeg, Steve .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) :646-656