Malicious sequential pattern mining for automatic malware detection

被引:95
作者
Fan, Yujie [1 ]
Ye, Yanfang [2 ]
Chen, Lifei [1 ,3 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou, Peoples R China
[2] W Virginia Univ, Dept Comp Sci & Elect Engn, Morgantown, WV 26506 USA
[3] Univ Sherbrooke, Dept Comp Sci, Sherbrooke, PQ J1K 2R1, Canada
基金
中国国家自然科学基金;
关键词
Malware detection; Instruction sequence; Sequential pattern mining; Classification;
D O I
10.1016/j.eswa.2016.01.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to its damage to Internet security, malware (e.g., virus, worm, trojan) and its detection has caught the attention of both anti-malware industry and researchers for decades. To protect legitimate users from the attacks, the most significant line of defense against malware is anti-malware software products, which mainly use signature-based method for detection. However, this method fails to recognize new, unseen malicious executables. To solve this problem, in this paper, based on the instruction sequences extracted from the file sample set, we propose an effective sequence mining algorithm to discover malicious sequential patterns, and then All-Nearest-Neighbor (ANN) classifier is constructed for malware detection based on the discovered patterns. The developed data mining framework composed of the proposed sequential pattern mining method and ANN classifier can well characterize the malicious patterns from the collected file sample set to effectively detect newly unseen malware samples. A comprehensive experimental study on a real data collection is performed to evaluate our detection framework. Promising experimental results show that our framework outperforms other alternate data mining based detection methods in identifying new malicious executables. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:16 / 25
页数:10
相关论文
共 36 条
[31]  
Uppal D, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P2337, DOI 10.1109/ICACCI.2014.6968547
[32]  
Wuchner T., 2014, Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '14, P271, DOI DOI 10.1145/2590296.2590319
[33]  
Ye Y, 2010, P 16 ACM SIGKDD INT, P95
[34]   An intelligent PE-malware detection system based on association mining [J].
Ye, Yanfang ;
Wang, Dingding ;
Li, Tao ;
Ye, Dongyi ;
Jiang, Qingshan .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (04) :323-334
[35]   Pseudo nearest neighbor rule for pattern classification [J].
Zeng, Yong ;
Yang, Yupu ;
Zhao, Liang .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (02) :3587-3595
[36]  
Zhang Jian-fei, 2012, Journal of Computer Applications, V32, P2761, DOI 10.3724/SP.J.1087.2012.02761