SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods

被引:55
|
作者
Cohen, Aviad [1 ,2 ]
Nissim, Nir [1 ,2 ]
Rokach, Lior [1 ,2 ]
Elovici, Yuval [1 ,2 ]
机构
[1] Ben Gurion Univ Negev, Dept Informat Syst Engn, IL-84105 Beer Sheva, Israel
[2] Ben Gurion Univ Negev, Cyber Secur Res Ctr, Malware Lab, IL-84105 Beer Sheva, Israel
关键词
Machine learning; Malware detection; Static analysis; Structural features; Microsoft office open xml; Document; MALWARE DETECTION; PDF FILES; CLASSIFICATION;
D O I
10.1016/j.eswa.2016.07.010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Office documents are used extensively by individuals and organizations. Most users consider these documents safe for use. Unfortunately, Office documents can contain malicious components and perform harmful operations. Attackers increasingly take advantage of naive users and leverage Office documents in order to launch sophisticated advanced persistent threat (APT) and ransomware attacks. Recently, targeted cyber-attacks against organizations have been initiated with emails containing malicious attachments. Since most email servers do not allow the attachment of executable files to emails, attackers prefer to use of non-executable files (e.g., documents) for malicious purposes. Existing anti-virus engines primarily use signature-based detection methods, and therefore fail to detect new unknown malicious code which has been embedded in an Office document. Machine learning methods have been shown to be effective at detecting known and unknown malware in various domains, however, to the best of our knowledge, machine learning methods have not been used for the detection of malicious XML-based Office documents (*.docx, *.xlsx, *.pptx, *.odt, *.ods, etc.). In this paper we present a novel structural feature extraction methodology (SFEM) for XML-based Office documents. SFEM extracts discriminative features from documents, based on their structure. We leveraged SFEM's features with machine learning algorithms for effective detection of malicious *.docx documents. We extensively evaluated SFEM with machine learning classifiers using a representative collection (16,938 *.docx documents collected "from the wild") which contains 4.9% malicious and similar to 95.1% benign documents. We examined 1,600 unique configurations based on different combinations of feature extraction, feature selection, feature representation, top-feature selection methods, and machine learning classifiers. The results show that machine learning algorithms trained on features provided by SFEM successfully detect new unknown malicious *.docx documents. The Random Forest classifier achieves the highest detection rates, with an AUC of 99.12% and true positive rate (TPR) of 97% that is accompanied by a false positive rate (FPR) of 4.9%. In comparison, the best anti-virus engine achieves a TPR which is 25% lower. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:324 / 343
页数:20
相关论文
共 50 条
  • [1] ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology
    Nissim, Nir
    Cohen, Aviad
    Elovici, Yuval
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 631 - 646
  • [2] CADefender: Detection of unknown malicious AutoLISP computer-aided design files using designated feature extraction and machine learning methods
    Yevsikov, Alexander
    Muralidharan, Trivikram
    Panker, Tomer
    Nissim, Nir
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 138
  • [3] Malicious PDF Documents Detection using Machine Learning Techniques A Practical Approach with Cloud Computing Applications
    Torres, Jose
    De Los Santos, Sergio
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 337 - 344
  • [4] Boosting the Detection of Malicious Documents Using Designated Active Learning Methods
    Nissim, Nir
    Cohen, Aviad
    Elovici, Yuval
    2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, : 760 - 765
  • [5] Neonates Crying Detection Through Feature Extraction and Machine Learning Methods
    Nunez-Calvo, Lucia
    Velasco-Perez, Nuria
    Lozano-Juarez, Samuel
    Herrero, Alvaro
    Arnaez, Juan
    Urda, Daniel
    HYBRID ARTIFICIAL INTELLIGENT SYSTEM, PT I, HAIS 2024, 2025, 14857 : 275 - 285
  • [6] Improving Detection of Malicious Office Documents using One-Side Classifiers
    Vitel, Silviu-Constantin
    Balan, Gheorghe
    Prelipcean, Dumitru Bogdan
    2019 21ST INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2019), 2020, : 243 - 247
  • [7] Malicious URL Detection Using Machine Learning
    Hani, Dr Raed Bani
    Amoura, Motasem
    Ammourah, Mohammad
    Abu Khalil, Yazeed
    2024 15TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS, ICICS 2024, 2024,
  • [8] A Feature Extraction Approach for the Detection of Phishing Websites Using Machine Learning
    Gundla, Sri Charan
    Karthik, M. Praveen
    Reddy, Middi Jashwanth Kumar
    Gourav
    Pankaj, Ashutosh
    Stamenkovic, Z.
    Raja, S. P.
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2024, 33 (02)
  • [9] Structural Analysis of URL For Malicious URL Detection Using Machine Learning
    Raja, A. Saleem
    Peerbasha, S.
    Iqbal, Y. Mohammed
    Sundarvadivazhagan, B.
    Surputheen, M. Mohamed
    JOURNAL OF ADVANCED APPLIED SCIENTIFIC RESEARCH, 2023, 5 (04): : 28 - 41
  • [10] Brake Disc Deformation Detection Using Intuitive Feature Extraction and Machine Learning
    Dozsa, Tamas
    Ori, Peter
    Szabari, Matyas
    Simonyi, Erno
    Soumelidis, Alexandros
    Lakatos, Istvan
    MACHINES, 2024, 12 (04)