Performance Comparison of Training Datasets for System Call-Based Malware Detection with Thread Information

被引:3
作者
Kajiwara, Yuki [1 ,2 ]
Zheng, Junjun [1 ]
Mouri, Koichi [1 ]
机构
[1] Ritsumeikan Univ, Coll Informat Sci & Engn, Kusatsu 5258577, Japan
[2] NEC Corp Ltd, Tokyo 1088001, Japan
关键词
malware detection; machine learning; system calls; thread;
D O I
10.1587/transinf.2021EDP7067
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The number of malware, including variants and new types, is dramatically increasing over the years, posing one of the greatest cyber-security threats nowadays. To counteract such security threats, it is crucial to detect malware accurately and early enough. The recent advances in machine learning technology have brought increasing interest in malware detection. A number of research studies have been conducted in the field. It is well known that malware detection accuracy largely depends on the training dataset used. Creating a suitable training dataset for efficient malware detection is thus crucial. Different works usually use their own dataset; therefore, a dataset is only effective for one detection method, and strictly comparing several methods using a common training dataset is difficult. In this paper, we focus on how to create a training dataset for efficiently detecting malware. To achieve our goal, the first step is to clarify the information that can accurately characterize malware. This paper concentrates on threads, by treating them as important information for characterizing malware. Specifically, on the basis of the dynamic analysis log from the Alkanet, a system call tracer, we obtain the thread information and classify the thread information processing into four patterns. Then the malware detection is performed using the number of transitions of system calls appearing in the thread as a feature. Our comparative experimental results showed that the primary thread information is important and useful for detecting malware with high accuracy.
引用
收藏
页码:2173 / 2183
页数:11
相关论文
共 27 条
  • [1] Ahsan-Ul-Haque ASM, 2018, IEEE GLOB COMM CONF
  • [2] B2B E-Commerce Institutionalization in SMEs in Less Developed Countries: A Model and Instrument
    Ali, Almaaf Bader A.
    Miao, Jian-Jun
    Quang-Dung Tran
    [J]. INTERNATIONAL JOURNAL OF E-ADOPTION, 2013, 5 (04) : 1 - 21
  • [3] [Anonymous], 2009, P 2009 ACM SIGPLAN S
  • [4] Canali D., 2012, ISSTA, P122, DOI [10.1145/2338965.2336768, DOI 10.1145/2338965.2336768]
  • [5] Chowdhury M, 2017, C IND ELECT APPL, P1691, DOI 10.1109/ICIEA.2017.8283111
  • [6] Darshan SLS, 2016, INT CONF IND INF SYS, P534, DOI 10.1109/ICIINFS.2016.8262998
  • [7] Eagle Chris, 2011, The IDA pro book
  • [8] Ethem, 2020, ALPAYDIN INTRO MACHI
  • [9] Garg Vidhi, 2019, 2019 4th International Conference on Information Systems and Computer Networks (ISCON), P400, DOI 10.1109/ISCON47742.2019.9036219
  • [10] Grygorenko O., 2019, INFORM TELECOMMUNICA, V2, P34