Malware Detection with Directed Cyclic Graph and Weight Merging

被引:2
作者
Li, Shanxi [1 ]
Zhou, Qingguo [1 ]
Wei, Wei [2 ]
机构
[1] Lanzhou Univ, Sch Informat Sci & Engn, Lanzhou 730000, Peoples R China
[2] Xian Univ Technol, Sch Comp Sci & Engn, Xian 710048, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2021年 / 15卷 / 09期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
malware detection; directed cyclic graph; Markov Chain; machine learning; neural network;
D O I
10.3837/tiis.2021.09.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware is a severe threat to the computing system and there's a long history of the battle between malware detection and anti-detection. Most traditional detection methods are based on static analysis with signature matching and dynamic analysis methods that are focused on sensitive behaviors. However, the usual detections have only limited effect when meeting the development of malware, so that the manual update for feature sets is essential. Besides, most of these methods match target samples with the usual feature database, which ignored the characteristics of the sample itself. In this paper, we propose a new malware detection method that could combine the features of a single sample and the general features of malware. Firstly, a structure of Directed Cyclic Graph (DCG) is adopted to extract features from samples. Then the sensitivity of each API call is computed with Markov Chain. Afterward, the graph is merged with the chain to get the final features. Finally, the detectors based on machine learning or deep learning are devised for identification. To evaluate the effect and robustness of our approach, several experiments were adopted. The results showed that the proposed method had a good performance in most tests, and the approach also had stability with the development and growth of malware.
引用
收藏
页码:3258 / 3273
页数:16
相关论文
共 28 条
[1]  
Alam S, 2016, INT CONF UBIQ FUTUR, P987, DOI 10.1109/ICUFN.2016.7536945
[2]  
Alqurashi S, 2017, INT CONF INTERNET, P105, DOI 10.23919/ICITST.2017.8356357
[3]  
Bazrafshan Z, 2013, 2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), P113, DOI 10.1109/IKT.2013.6620049
[4]   The use of the area under the roc curve in the evaluation of machine learning algorithms [J].
Bradley, AP .
PATTERN RECOGNITION, 1997, 30 (07) :1145-1159
[5]   Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection [J].
Chen, Xiao ;
Li, Chaoran ;
Wang, Derui ;
Wen, Sheng ;
Zhang, Jun ;
Nepal, Surya ;
Xiang, Yang ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :987-1001
[6]  
Chereau Jean P., 2019, ARXIV191011374CSEESS
[7]   Detecting IoT Malware by Markov Chain Behavioral Models [J].
Ficco, Massimo .
2019 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2019, :229-234
[8]   CNN-based Android Malware Detection [J].
Ganesh, Meenu ;
Pednekar, Priyanka ;
Prabhuswamy, Pooja ;
Nair, Divyashri Sreedharan ;
Park, Younghee ;
Jeon, Hyeran .
PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA), 2017, :60-65
[9]  
Habi HV, 2019, IEEE WRK SIG PRO SYS, P184, DOI [10.1109/SiPS47522.2019.9020603, 10.1109/sips47522.2019.9020603]
[10]  
Hadri A, 2016, 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION SYSTEMS AND INFORMATION SECURITY (ACOSIS), P111