Characterising Malicious Software with High-Level Behavioural Patterns

被引:2
作者
Stastna, Jana [1 ]
Tomasek, Martin [1 ]
机构
[1] Tech Univ Kosice, Dept Comp & Informat, Letna 9, Kosice 04200, Slovakia
来源
SOFSEM 2017: THEORY AND PRACTICE OF COMPUTER SCIENCE | 2017年 / 10139卷
关键词
Malware analysis; Behavioural patterns; High-level representation; Syntax-independent; CLASSIFICATION;
D O I
10.1007/978-3-319-51963-0_37
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Current research trends concerning malicious software indicate preferring malware behaviour over malware structure analysis. Detection is heading to methods employing malware models on higher level of abstraction, not purely on the level of program's code. Specification of applicable level of abstraction for investigation and detection of malware may present a serious challenge. Many approaches claim using high-level abstraction of malware behaviour but they are still based on sequences of instructions which form the malicious program. Techniques which rely on syntactic representation potentially fail whenever malware writers employ mutation or obfuscation of malicious code. Our work presents a different strategy. We utilised freely available information about malicious programs which were already inspected and tried to find patterns in malware behaviour, which are not bound to syntactic representation of malicious samples and so should withstand malware mutation on the syntactic level.
引用
收藏
页码:473 / 484
页数:12
相关论文
共 16 条
  • [1] MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection
    Alam, Shahid
    Horspool, R. Nigel
    Traore, Issa
    [J]. 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 480 - 489
  • [2] Bailey M, 2007, LECT NOTES COMPUT SC, V4637, P178
  • [3] Bayer U., 2009, P 2 USENIX C LARG SC, P8
  • [4] A fast malware detection algorithm based on objective-oriented association mining
    Ding, Yuxin
    Yuan, Xuebing
    Tang, Ke
    Xiao, Xiao
    Zhang, Yibin
    [J]. COMPUTERS & SECURITY, 2013, 39 : 315 - 324
  • [5] Feature representation and selection in malicious code detection methods based on static system calls
    Ding Yuxin
    Yuan Xuebing
    Zhou Di
    Dong Li
    An Zhanchao
    [J]. COMPUTERS & SECURITY, 2011, 30 (6-7) : 514 - 524
  • [6] A Survey on Automated Dynamic Malware-Analysis Techniques and Tools
    Egele, Manuel
    Scholte, Theodoor
    Kirda, Engin
    Kruegel, Christopher
    [J]. ACM COMPUTING SURVEYS, 2012, 44 (02)
  • [7] Ontology for Malware Behavior: a Core Model Proposal
    Gregio, Andre
    Bonacin, Rodrigo
    Nabuco, Olga
    Afonso, Vitor Monte
    de Geus, Paulo Licio
    Jino, Mario
    [J]. 2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 453 - 458
  • [8] Liu Wu, 2011, Proceedings of the 2011 First International Workshop on Complexity and Data Mining (IWCDM 2011), P39, DOI 10.1109/IWCDM.2011.17
  • [9] ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences
    Lu, Huabiao
    Wang, Xiaofeng
    Zhao, Baokang
    Wang, Fei
    Su, Jinshu
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) : 1140 - 1154
  • [10] Exploring multiple execution paths for malware analysis
    Moser, Andreas
    Kruegel, Christopher
    Kirda, Engin
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 231 - +