Evaluation of Supervised Machine Learning Techniques for Dynamic Malware Detection

被引:5
作者
Zhao, Hongwei [1 ,2 ]
Li, Mingzhao [1 ]
Wu, Taiqi [1 ]
Yang, Fei [3 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun, Jilin, Peoples R China
[2] Jilin Univ, Minist Educ, Changchun Key Lab Symbol Computat & Knowledge Eng, State Key Lab Appl Opt, Changchun, Jilin, Peoples R China
[3] Jilin Univ, Coll Software, Changchun, Jilin, Peoples R China
关键词
Dynamic Analysis; Malware detection; Machine Learning; Static Analysis; CLASSIFICATION;
D O I
10.2991/ijcis.11.1.87
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, security of the computer systems has become a major concern of security experts. In spite of many antivirus and malware detection systems, the number of malware incidents are increasing day by day. Many static and dynamic techniques have been proposed to detect the malware and classify them into malware families accurately. The dynamic malware detection has potential benefits over the static ones to detect malware effectively. Because, it is difficult to mask behavior of malware while executing than its underlying code in static malware detection. Recently, machine learning techniques have been the main focus of the security experts to detect malware and predict their families dynamically. But, to the best of our knowledge, there exists no comprehensive work that compares and evaluates a sufficient number of machine learning techniques for classifying malware and benign samples. In this work, we conducted a set of experiments to evaluate machine learning techniques for detecting malware and their classification into respective families dynamically. A set of real malware samples and benign programs have been received from VirusTotal, and executed in a controlled & isolated environment to record malware behavior for evaluation of machine learning techniques in terms of commonly used performance metrics. From the execution reports saved in the form of JSON reports, we extract a promising set of features representing behavior of a malware sample. The identified set of features is further employed to classify malware and benign samples. The Major motivation of this work is that different techniques have been designed to optimize different criteria. So, they behave differently, even in similar conditions. In addition to classification of malware and benign samples dynamically, we reveal guidelines for researchers to apply machine learning techniques for detecting malware dynamically, and directions for further research in the field.
引用
收藏
页码:1153 / 1169
页数:17
相关论文
共 30 条
[1]  
Ahmad SF, 2015, EL INF TECHN INT P I, P17
[2]  
[Anonymous], 2017, KNOWLEDGE INFORM SYS
[3]  
[Anonymous], 1961, Adaptive Control Processes: a Guided Tour, DOI DOI 10.1515/9781400874668
[4]  
[Anonymous], 2013, AUT MALW AN
[5]  
[Anonymous], 2012, Proceedings of ACM Symposium on Access Control Models and Technologies
[6]  
Bayer U, 2006, J COMPUT VIROL HACKI, V2, P67, DOI 10.1007/s11416-006-0012-2
[7]  
Cesare S., 2012, Software Similarity and Classification
[8]  
Dini Gianluca, 2012, Computer Network Security. Proceedings 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, P240, DOI 10.1007/978-3-642-33704-8_21
[9]   A Survey on Automated Dynamic Malware-Analysis Techniques and Tools [J].
Egele, Manuel ;
Scholte, Theodoor ;
Kirda, Engin ;
Kruegel, Christopher .
ACM COMPUTING SURVEYS, 2012, 44 (02)
[10]  
Gorecki C, 2011, LECT NOTES COMPUT SC, V6976, P208, DOI 10.1007/978-3-642-24550-3_17