Malicious sequential pattern mining for automatic malware detection

被引:95
作者
Fan, Yujie [1 ]
Ye, Yanfang [2 ]
Chen, Lifei [1 ,3 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou, Peoples R China
[2] W Virginia Univ, Dept Comp Sci & Elect Engn, Morgantown, WV 26506 USA
[3] Univ Sherbrooke, Dept Comp Sci, Sherbrooke, PQ J1K 2R1, Canada
基金
中国国家自然科学基金;
关键词
Malware detection; Instruction sequence; Sequential pattern mining; Classification;
D O I
10.1016/j.eswa.2016.01.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to its damage to Internet security, malware (e.g., virus, worm, trojan) and its detection has caught the attention of both anti-malware industry and researchers for decades. To protect legitimate users from the attacks, the most significant line of defense against malware is anti-malware software products, which mainly use signature-based method for detection. However, this method fails to recognize new, unseen malicious executables. To solve this problem, in this paper, based on the instruction sequences extracted from the file sample set, we propose an effective sequence mining algorithm to discover malicious sequential patterns, and then All-Nearest-Neighbor (ANN) classifier is constructed for malware detection based on the discovered patterns. The developed data mining framework composed of the proposed sequential pattern mining method and ANN classifier can well characterize the malicious patterns from the collected file sample set to effectively detect newly unseen malware samples. A comprehensive experimental study on a real data collection is performed to evaluate our detection framework. Promising experimental results show that our framework outperforms other alternate data mining based detection methods in identifying new malicious executables. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:16 / 25
页数:10
相关论文
共 36 条
[11]  
Griffin K, 2009, LECT NOTES COMPUT SC, V5758, P101, DOI 10.1007/978-3-642-04342-0_6
[12]  
Guo GD, 2003, LECT NOTES COMPUT SC, V2888, P986
[13]  
Hofmeyr S. A., 1998, Journal of Computer Security, V6, P151
[14]  
Jain M., 2014, International Journal of Computer Science and Mobile Computing, V3, P930
[15]  
Kephart J.O., 1994, P 4 VIRUS B INT C, P178
[16]  
Lo D, 2009, KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, P557
[17]   DLLMiner: structural mining for malware detection [J].
Narouei, Masoud ;
Ahmadi, Mansour ;
Giacinto, Giorgio ;
Takabi, Hassan ;
Sami, Ashkan .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3311-3322
[18]   Novel active learning methods for enhanced PC malware detection in windows OS [J].
Nissim, Nir ;
Moskovitch, Robert ;
Rokach, Lior ;
Elovici, Yuval .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (13) :5843-5857
[19]  
Qiao Yong., 2014, Knowledge Engineering and Management, P225
[20]  
Rad BB, 2012, 2012 INTERNATIONAL CONFERENCE ON E-LEARNING AND E-TECHNOLOGIES IN EDUCATION (ICEEE), P209, DOI 10.1109/ICeLeTE.2012.6333411