DLLMiner: structural mining for malware detection

被引:32
作者
Narouei, Masoud [1 ]
Ahmadi, Mansour [2 ]
Giacinto, Giorgio [2 ]
Takabi, Hassan [1 ]
Sami, Ashkan [3 ,4 ]
机构
[1] Univ N Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
[2] Univ Cagliari, Dept Elect & Elect Engn, I-09124 Cagliari, Italy
[3] Shiraz Univ, Sch Elect & Comp Engn, CSE, Shiraz, Iran
[4] Shiraz Univ, Sch Elect & Comp Engn, IT Dept, Shiraz, Iran
关键词
malware analysis; dependency tree; closed frequent tree; evasion;
D O I
10.1002/sec.1255
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing anti-malware products usually use signature-based techniques as their main detection engine. Although these methods are very fast, they are unable to provide effective protection against newly discovered malware or mutated variant of old malware. Heuristic approaches are the next generation of detection techniques to mitigate the problem. These approaches aim to improve the detection rate by extracting more behavioral characteristics of malware. Although these approaches cover the disadvantages of signature-based techniques, they usually have a high false positive, and evasion is still possible from these approaches. In this paper, we propose an effective and efficient heuristic technique based on static analysis that not only detect malware with a very high accuracy, but also is robust against common evasion techniques such as junk injection and packing. Our proposed system is able to extract behavioral features from a unique structure in portable executable, which is called dynamic-link library dependency tree, without actually executing the application. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3311 / 3322
页数:12
相关论文
共 47 条
[11]  
Chen Hao., 2004, NDSS, P171
[12]  
Chi Y, 2004, LECT NOTES ARTIF INT, V3056, P63
[13]  
Christodorescu M, 2003, P 12 C USENIX SEC S, V12, P12, DOI DOI 10.21236/ADA449067
[14]  
Di Cerbo F, 2011, LECT NOTES COMPUT SC, V6540, P138, DOI 10.1007/978-3-642-19376-7_12
[15]   A Survey on Automated Dynamic Malware-Analysis Techniques and Tools [J].
Egele, Manuel ;
Scholte, Theodoor ;
Kirda, Engin ;
Kruegel, Christopher .
ACM COMPUTING SURVEYS, 2012, 44 (02)
[16]  
F- Secure, 2007, F SEC REP AM MALW GR
[17]  
Feng HH, 2004, P IEEE S SECUR PRIV, P194
[18]   Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors [J].
Fredrikson, Matt ;
Jha, Somesh ;
Christodorescu, Mihai ;
Sailer, Reiner ;
Yan, Xifeng .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :45-60
[19]  
Griffin K, 2009, LECT NOTES COMPUT SC, V5758, P101, DOI 10.1007/978-3-642-04342-0_6
[20]   Frequent pattern mining: current status and future directions [J].
Han, Jiawei ;
Cheng, Hong ;
Xin, Dong ;
Yan, Xifeng .
DATA MINING AND KNOWLEDGE DISCOVERY, 2007, 15 (01) :55-86