Malware classification and composition analysis: A survey of recent developments

被引:49
作者
Abusitta, Adel [1 ]
Li, Miles Q. [1 ]
Fung, Benjamin C. M. [1 ]
机构
[1] McGill Univ, Montreal, PQ, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Malware analysis; Malware classification; Security; Anti-analysis techniques; Composition analysis; HYBRID ANALYSIS; EXTRACTION; FRAMEWORK;
D O I
10.1016/j.jisa.2021.102828
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware detection and classification are becoming more and more challenging, given the complexity of malware design and the recent advancement of communication and computing infrastructure. The existing malware classification approaches enable reverse engineers to better understand their patterns and categorizations, and to cope with their evolution. Moreover, new compositions analysis methods have been proposed to analyze malware samples with the goal of gaining deeper insight on their functionalities and behaviors. This, in turn, helps reverse engineers discern the intent of a malware sample and understand the attackers' objectives. This survey classifies and compares the main findings in malware classification and composition analyses. We also discuss malware evasion techniques and feature extraction methods. Besides, we characterize each reviewed paper on the basis of both algorithms and features used, and highlight its strengths and limitations. We furthermore present issues, challenges, and future research directions related to malware analysis.
引用
收藏
页数:17
相关论文
共 153 条
[1]  
Agrawal R, 1994, P 20 INT C VER LARG
[2]   Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification [J].
Ahmadi, Mansour ;
Ulyanov, Dmitry ;
Semenov, Stanislav ;
Trofimov, Mikhail ;
Giacinto, Giorgio .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :183-194
[3]  
Ahmed F., 2009, P 2 ACM WORKSH SEC A, P55, DOI DOI 10.1145/1654988.1655003
[4]   AN INTRODUCTION TO KERNEL AND NEAREST-NEIGHBOR NONPARAMETRIC REGRESSION [J].
ALTMAN, NS .
AMERICAN STATISTICIAN, 1992, 46 (03) :175-185
[5]   Graph-based malware detection using dynamic analysis [J].
Anderson, Blake ;
Quist, Daniel ;
Neil, Joshua ;
Storlie, Curtis ;
Lane, Terran .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04) :247-258
[6]  
Anderson Blake., 2012, P 5 ACM WORKSHOP SEC, P3
[7]   Hidden Markov models for malware classification [J].
Annachhatre, Chinmayee ;
Austin, Thomas H. ;
Stamp, Mark .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (02) :59-73
[8]  
[Anonymous], 2019, MALWARE NUMBERS 2017
[9]  
[Anonymous], 2014, INT C LEARN REPR
[10]  
[Anonymous], 2008, Advances in neural information processing systems