Security importance assessment for system objects and malware detection

被引:20
作者
Mao, Weixuan [1 ]
Cai, Zhongmin [1 ]
Towsley, Don [2 ]
Feng, Qian [3 ]
Guan, Xiaohong [1 ]
机构
[1] Xi An Jiao Tong Univ, Key Lab Intelligent Networks & Network Secur, Xian, Peoples R China
[2] Univ Massachusetts, Coll Informat & Comp Sci, Amherst, MA 01003 USA
[3] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY USA
关键词
Importance metric; Access behavior; Security dependency network; Malware detection; Behavioral-based detection; PROTECTION;
D O I
10.1016/j.cose.2017.02.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
System objects play different roles in computer systems and exhibit different levels of importance to system security. Assessing the importance of system objects helps us develop effective security protection methods. However, little work has focused on understanding and assessing the importance of system objects from a security perspective. In this paper, we build a security dependency network from access behaviors to quantify the security importance of system objects from a system-wide perspective. Similar to other networked systems, we observe small-world effect and power-law distributions for in and out-degree in the security dependency network. Exploring rich network structures in the security dependency network provides insights into the importance of system objects in security. We assess the importance of system objects, with respect to security, by the centrality metrics and propose an importance based model for malware detection. We evaluate importance metrics of system objects from various perspectives to demonstrate their feasibility and practicality. Furthermore, extensive experimental results on a real-world dataset demonstrate that our model is capable of detecting 7257 malware samples from 27,840 benign processes with a 93.92% true positive rate at 0.1% false positive rate. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:47 / 68
页数:22
相关论文
共 52 条
[1]  
Agrawal G., 1999, Proceedings IEEE International Conference on Software Maintenance - 1999 (ICSM'99). `Software Maintenance for Business Change' (Cat. No.99CB36360), P453, DOI 10.1109/ICSM.1999.792643
[2]  
Apap R, 2002, LECT NOTES COMPUT SC, V2516, P36
[3]  
Bell DE, 1973, 73278 ESDTR MITRE CO
[4]   Dataflow anomaly detection [J].
Bhatkar, Sandeep ;
Chaturvedi, Abhishek ;
Sekar, R. .
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, :48-+
[5]  
Biba, 1977, 76372 ESDTR MITRE CO
[6]   A new uncertainty importance measure [J].
Borgonovo, E. .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2007, 92 (06) :771-784
[7]   The anatomy of a large-scale hypertextual Web search engine [J].
Brin, S ;
Page, L .
COMPUTER NETWORKS AND ISDN SYSTEMS, 1998, 30 (1-7) :107-117
[8]  
Canali D., 2012, P 2012 INT S SOFTW T, P122, DOI [10.1145/2338965.2336768, DOI 10.1145/2338965.2336768]
[9]  
Chner T., 2014, P 11 WORKSH VIS CYB, P25, DOI DOI 10.1145/2671491.2671499
[10]   Power-Law Distributions in Empirical Data [J].
Clauset, Aaron ;
Shalizi, Cosma Rohilla ;
Newman, M. E. J. .
SIAM REVIEW, 2009, 51 (04) :661-703