A BEHAVIOR-BASED APPROACH FOR MALWARE DETECTION

被引:25
作者
Mosli, Rayan [1 ]
Li, Rui [2 ]
Yuan, Bo [3 ]
Pan, Yin [3 ]
机构
[1] Rochester Inst Technol, Comp & Informat Sci, Rochester, NY 14623 USA
[2] Rochester Inst Technol, Golisano Coll Comp & Informat Sci, Rochester, NY 14623 USA
[3] Rochester Inst Technol, Comp Secur, Rochester, NY 14623 USA
来源
ADVANCES IN DIGITAL FORENSICS XIII | 2017年 / 511卷
基金
美国国家科学基金会;
关键词
Malware; memory forensics; machine learning; handles;
D O I
10.1007/978-3-319-67208-3_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware is the fastest growing threat to information technology systems. Although a single absolute solution for defeating malware is improbable, a stacked arsenal against malicious software enhances the ability to maintain security and privacy. This research attempts to reinforce the anti-malware arsenal by studying a behavioral activity common to software -the use of handles. The characteristics of handle usage by benign and malicious software are extracted and exploited in an effort to distinguish between the two classes. An automated malware detection mechanism is presented that utilizes memory forensics, information retrieval and machine learning techniques. Experimentation with a malware dataset yields a malware detection rate of 91.4% with precision and recall of 89.8% and 91.1%, respectively.
引用
收藏
页码:187 / 201
页数:15
相关论文
共 36 条
[1]  
Aghaeikheirabady M., 2014, 2014 INT C TECHNOLOG
[2]   AN INTRODUCTION TO KERNEL AND NEAREST-NEIGHBOR NONPARAMETRIC REGRESSION [J].
ALTMAN, NS .
AMERICAN STATISTICIAN, 1992, 46 (03) :175-185
[3]  
[Anonymous], 2008, Introduction to information retrieval
[4]  
[Anonymous], 2015, P 8 ACM WORKSH ART I, DOI DOI 10.1145/2808769.2808773
[5]  
[Anonymous], P 2 WORKSH ANT TEST
[6]  
Blunden B., 2013, ROOTKIT ARSENAL ESCA
[7]  
Buitinck L, 2013, ECML PKDD WORKSH LAN, P108, DOI DOI 10.48550/ARXIV.1309.0238
[8]   Semantics-aware malware detection [J].
Christodorescu, M ;
Jha, S ;
Seshia, SA ;
Song, D ;
Bryant, RE .
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, :32-46
[9]  
CORTES C, 1995, MACH LEARN, V20, P273, DOI 10.1023/A:1022627411411
[10]  
Dolan-Gavitt B, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P566