Malicious sequential pattern mining for automatic malware detection

被引:95
作者
Fan, Yujie [1 ]
Ye, Yanfang [2 ]
Chen, Lifei [1 ,3 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou, Peoples R China
[2] W Virginia Univ, Dept Comp Sci & Elect Engn, Morgantown, WV 26506 USA
[3] Univ Sherbrooke, Dept Comp Sci, Sherbrooke, PQ J1K 2R1, Canada
基金
中国国家自然科学基金;
关键词
Malware detection; Instruction sequence; Sequential pattern mining; Classification;
D O I
10.1016/j.eswa.2016.01.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to its damage to Internet security, malware (e.g., virus, worm, trojan) and its detection has caught the attention of both anti-malware industry and researchers for decades. To protect legitimate users from the attacks, the most significant line of defense against malware is anti-malware software products, which mainly use signature-based method for detection. However, this method fails to recognize new, unseen malicious executables. To solve this problem, in this paper, based on the instruction sequences extracted from the file sample set, we propose an effective sequence mining algorithm to discover malicious sequential patterns, and then All-Nearest-Neighbor (ANN) classifier is constructed for malware detection based on the discovered patterns. The developed data mining framework composed of the proposed sequential pattern mining method and ANN classifier can well characterize the malicious patterns from the collected file sample set to effectively detect newly unseen malware samples. A comprehensive experimental study on a real data collection is performed to evaluate our detection framework. Promising experimental results show that our framework outperforms other alternate data mining based detection methods in identifying new malicious executables. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:16 / 25
页数:10
相关论文
共 36 条
[1]   Phishing detection based Associative Classification data mining [J].
Abdelhamid, Neda ;
Ayesh, Aladdin ;
Thabtah, Fadi .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (13) :5948-5959
[2]  
Ahmadi M., 2015, NOVEL FEATURE EXTRAC
[3]  
Ahmadi M, 2013, COMPUT FRAUD SECUR, P11, DOI 10.1016/S1361-3723(13)70072-1
[4]  
[Anonymous], 2015, MCAFEE LABS THREATS
[5]  
[Anonymous], 1997, ICML
[6]  
[Anonymous], P 4 INT C KNOWL DISC
[7]  
[Anonymous], 2011, Pei. data mining concepts and techniques, DOI 10.1016/C2009-0-61819-5
[8]   Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach [J].
Austin, Thomas H. ;
Filiol, Eric ;
Josse, Sebastien ;
Stamp, Mark .
PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, :5039-5048
[9]  
Bazrafshan Z, 2013, 2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), P113, DOI 10.1109/IKT.2013.6620049
[10]   A Survey on Automated Dynamic Malware-Analysis Techniques and Tools [J].
Egele, Manuel ;
Scholte, Theodoor ;
Kirda, Engin ;
Kruegel, Christopher .
ACM COMPUTING SURVEYS, 2012, 44 (02)