Metamorphic Malware Detection by PE Analysis with the Longest Common Sequence

被引:3
作者
Thanh Nguyen Vu [1 ]
Toan Tan Nguyen [1 ]
Hieu Phan Trung [1 ]
Thao Do Duy [1 ]
Ke Hoang Van [1 ]
Tuan Dinh Le [2 ]
机构
[1] Vietnam Natl Univ, Univ Informat Technol, Ho Chi Minh City, Vietnam
[2] Long An Univ Econ & Ind, Tan An, Long An Provinc, Vietnam
来源
FUTURE DATA AND SECURITY ENGINEERING | 2017年 / 10646卷
关键词
Malware detection; Data mining; Longest common sequence; Neural network; MALICIOUS EXECUTABLES;
D O I
10.1007/978-3-319-70004-5_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Metamorphic malware detection is one of the most challenging tasks of antivirus software because of the difference in signatures of new variants from preceding one [1]. This paper proposes the method for the metamorphic malware detection by Portable Executable (PE) Analysis with the Longest Common Sequence (LCS). The proposed method contains the following phase: The raw feature extraction obtains valuable features like the information of Windows PE files which are PE header information, dependencies imports and API call functions, the code segments inside each of Windows PE file. Next, these segments are used for generating the detectors, which are later used to determine affinities with code segments of executable files by the longest common sequence algorithm. Finally, header, imports, API call information and affinities are combine into vectors as input for classifiers are used for classification after a dimensionality reduction. The experimental results showed that the proposed method can achieve up to 87.1% precision, 63.3% recall for benign and 92.6% precision, 93.7% for average malware.
引用
收藏
页码:262 / 272
页数:11
相关论文
共 12 条
[1]  
[Anonymous], 2017, TOTAL VIRUS VIRUSTOT
[2]  
AV-TEST Institute, 2016, AV TEST SEC REP
[3]  
Kolter JZ, 2006, J MACH LEARN RES, V7, P2721
[4]  
Microsoft Corporation, 2017, MICR PORT EX COMM OB
[5]  
Microsoft Corporation, DUMPBIN REF
[6]  
Microsoft Corporation, DESKT APP TECHN
[7]   The MALICIA dataset: identification and analysis of drive-by download operations [J].
Nappa, Antonio ;
Rafique, M. Zubair ;
Caballero, Juan .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (01) :15-33
[8]  
Rui Chao, 2009, Proceedings of the 2009 International Conference on Computational Intelligence and Security (CIS 2009), P6, DOI 10.1109/CIS.2009.106
[9]   Data mining methods for detection of new malicious executables [J].
Schultz, MG ;
Eskin, E ;
Zadok, E ;
Stolfo, SJ .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :38-49
[10]  
Shafiq MZ, 2009, LECT NOTES COMPUT SC, V5758, P121, DOI 10.1007/978-3-642-04342-0_7