On the Comparison of Malware Detection Methods Using Data Mining with Two Feature Sets

被引:8
作者
Srakaew, Sathaporn [1 ]
Piyanuntcharatsr, Warot [1 ]
Adulkasem, Suchitra [1 ]
Chantrapornchai, Chantana [2 ]
机构
[1] Silpakorn Univ, Fac Sci, Dept Comp, Bangkok, Thailand
[2] Kasetsart Univ, Fac Engn, Dept Comp Engn, Bangkok, Thailand
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2015年 / 9卷 / 03期
关键词
Malware detection; data mining; assembly features; statistical features;
D O I
10.14257/ijsia.2015.9.3.23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we compare the research methodology and performance of malware detection using data mining. Feature selection is an important problem in data mining. For the malware application, it is interesting to see which features that can be used to characterize the malware. Particularly, we are interested to compare two approaches that use features based on statistical values and the instructions. We adapt the experiment methodology using statistical features in [1] using 1,2,3 grams and varying block sizes as well as the methodology using the abstract assembly in [2] using 1,2,3 grams of consecutive instructions. We apply to our selected test set which is the data set from [3]. The decision tree J48 is used to model to detect three classes: Allapple, Podnuha, Virut. From the comparison experiments, it is found that the approach that considers the instruction set feature performs better. The test with the application set can give up to 100% correctness using the instruction features.
引用
收藏
页码:293 / 318
页数:26
相关论文
共 17 条
[1]  
Bailey M, 2007, LECT NOTES COMPUT SC, V4637, P178
[2]   Opcodes as predictor for malware [J].
Bilar, Daniel .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (02) :156-168
[3]  
Choudhary R., 2012, INT J INFORM TECHNOL, V5, P85
[4]  
Cover T., 2006, ELEMENTS INFORM THEO, V2nd, DOI DOI 10.1002/047174882X
[5]  
Huang HC, 2010, PICMET 2010: TECHNOLOGY MANAGEMENT FOR GLOBAL ECONOMIC GROWTH, DOI 10.1109/ICCASM.2010.5622193
[6]   Malware Detection by Data Mining Techniques Based on Positionally Dependent Features [J].
Komashinskiy, Dmitriy ;
Kotenko, Igor .
PROCEEDINGS OF THE 18TH EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, 2010, :617-623
[7]  
Kumar V., 2013, INT J COMPUTER APPL, V61, P16
[8]  
Momina Tabish S., 2009, P ACM SIGKDD WORKSH
[9]  
Perdisci R., P 7 USENIX C NETW SY
[10]  
Perdisci R., P 28 ANN COMP SEC A