A graph mining approach for detecting unknown malwares

被引:46
作者
Eskandari, Mojtaba [1 ]
Hashemi, Sattar [1 ]
机构
[1] Shiraz Univ, Dept Comp Sci & Engn, Shiraz, Iran
关键词
Malware; Detection; Unknown malwares; PE-file; CFG; API; SYSTEM;
D O I
10.1016/j.jvlc.2012.02.002
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays malware is one of the serious problems in the modern societies. Although the signature based malicious code detection is the standard technique in all commercial antivirus softwares, it can only achieve detection once the virus has already caused damage and it is registered. Therefore, it fails to detect new malwares (unknown malwares). Since most of malwares have similar behavior, a behavior based method can detect unknown malwares. The behavior of a program can be represented by a set of called API's (application programming interface). Therefore, a classifier can be employed to construct a learning model with a set of programs' API calls. Finally, an intelligent malware detection system is developed to detect unknown malwares automatically. On the other hand, we have an appealing representation model to visualize the executable files structure which is control flow graph (CFG). This model represents another semantic aspect of programs. This paper presents a robust semantic based method to detect unknown malwares based on combination of a visualize model (CFG) and called API's. The main contribution of this paper is extracting CFG from programs and combining it with extracted API calls to have more information about executable files. This new representation model is called API-CFG. In addition, to have fast learning and classification process, the control flow graphs are converted to a set of feature vectors by a nice trick. Our approach is capable of classifying unseen benign and malicious code with high accuracy. The results show a statistically significant improvement over n-grams based detection method. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:154 / 162
页数:9
相关论文
共 38 条
[31]  
Sathyanarayan VS, 2008, LECT NOTES COMPUT SC, V5107, P336, DOI 10.1007/978-3-540-70500-0_25
[32]  
Shabtai A., 2009, INFORM SECURITY TECH, V14, P16, DOI [DOI 10.1016/j.istr.2009.03.003, DOI 10.1016/J.ISTR.2009.03.003]
[33]  
Stolfo SJ, 2007, ADV INFORM SECUR, P231
[34]  
Szor P., 2001, VIR B C
[35]   Neural networks for computer virus recognition [J].
Tesauro, GJ ;
Kephart, JO ;
Sorkin, GB .
IEEE EXPERT-INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1996, 11 (04) :5-6
[36]  
Tran T., 2006, TOPICS COMPUTER COMM
[37]  
Xu J.-Y., 2004, Fourth International Conference on Hybrid Intelligent Systems, P378, DOI 10.1109/ICHIS.2004.75
[38]   An intelligent PE-malware detection system based on association mining [J].
Ye, Yanfang ;
Wang, Dingding ;
Li, Tao ;
Ye, Dongyi ;
Jiang, Qingshan .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (04) :323-334