A fast malware detection algorithm based on objective-oriented association mining

被引:42
作者
Ding, Yuxin [1 ]
Yuan, Xuebing [1 ]
Tang, Ke [1 ]
Xiao, Xiao [1 ]
Zhang, Yibin [2 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] Chinese Acad Sci, Inst Comp Technol, State Key Lab Comp Architecture, Beijing 100864, Peoples R China
关键词
Malware detection; Objective-oriented associate mining; Security; Classification; Machine learning; MALICIOUS CODE;
D O I
10.1016/j.cose.2013.08.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Objective-oriented association (OOA) mining has been successfully applied in malware detection. One problem of OOA mining is that the number of association rules is very large, and many of the rules are redundant and have little capacity to distinguish malware from benign files. This circumstance seriously affects the running speed of OOA for malware detection. In this paper, an API (Application Programming Interface)-based association mining method is proposed for detecting malware. To increase the detection speed of the OOA, different strategies are presented: to improve the rule quality, criteria for API selection are proposed to remove APIs that cannot become frequent items; to find association rules that have strong discrimination power, we define the rule utility to evaluate the association rules; and to improve the detection accuracy, a classification method based on multiple association rules is adopted. The experiments show that the proposed strategies can significantly improve the running speed of OOA. In our experiments the time cost for data mining is reduced by thirty-two percent, and the time cost for classification is reduced by fifty percent. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:315 / 324
页数:10
相关论文
共 38 条
[1]  
Agrawal R., 1994, P 20 INT C VER LARG, P487, DOI DOI 10.5555/645920.672836
[2]  
[Anonymous], 2011, Pei. data mining concepts and techniques
[3]  
Bergeron J, 2001, S REQ ENG INF SEC SR, P157
[4]  
Bing Liu, 1998, Proceedings Fourth International Conference on Knowledge Discovery and Data Mining, P80
[5]  
Brosch T, 2006, P BLACK HAT LAS VEG, P325
[6]  
Cha BR, 2005, IEEE SYMP COMP COMMU, P427
[7]  
Cheng H, 2007, PROC INT CONF DATA, P691
[8]   Semantics-aware malware detection [J].
Christodorescu, M ;
Jha, S ;
Seshia, SA ;
Song, D ;
Bryant, RE .
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, :32-46
[9]  
Christodorescu M., 2004, Software Engineering Notes, V29, P34, DOI 10.1145/1013886.1007518
[10]  
Dash SK, 2005, LECT NOTES COMPUT SC, V3803, P251