Improving the Detection of Malware Behaviour Using Simplified Data Dependent API Call Graph

被引:44
作者
Elhadi, Ammar Ahmed E. [1 ,2 ]
Maarof, Mohd Aizaini [1 ]
Barry, Bazara I. A. [3 ]
机构
[1] Univ Teknologi Malaysia, Fac Comp, Informat Assurance & Secur Res Grp, Skudai, Malaysia
[2] Elmashreq Coll Sci & technol, Khartoum, Sudan
[3] Univ Khartoum, Fac Math Sci, Khartoum, Sudan
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2013年 / 7卷 / 05期
关键词
Malware; Malware Detection; API call graph; API call graph matching; Longest common subsequence;
D O I
10.14257/ijsia.2013.7.5.03
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware stands for malicious software. It is software that is designed with a harmful intent. A malware detector is a system that attempts to identify malware using Application Programming Interface (API) call graph technique and/or other techniques. Matching the API call graph using graph matching algorithm have NP-complete problem and is slow because of computational complexity. In this study, a malware detection system based on API call graph is proposed. Each malware sample is represented as data dependent API call graph. After transforming the input sample into a simplified data dependent graph, graph matching algorithm is used to calculate similarity between the input sample and malware API call graph samples stored in a database. The graph matching algorithm is based on Longest Common Subsequence (LCS) algorithm which is used on the simplified graphs. Such strategy reduces the computation complexity by selecting paths with the same edge label in the API call graph. Experimental results on 85 samples demonstrate 98% detection rate and 0% false positive rate for the proposed malware detection system.
引用
收藏
页码:29 / 42
页数:14
相关论文
共 28 条
[1]  
[Anonymous], 2011, VX HEAVENS VIRUS COL
[2]  
API Monitor, 2012, SPY DISPL API CALLS
[3]  
Christodorescu S. J. Mihai, 2007, MALWARE DETECTION
[4]  
Elhadi Ammar Ahmed E., 2012, American Journal of Applied Sciences, V9, P283, DOI 10.3844/ajassp.2012.283.288
[5]  
Fukushimayz A. S. Yoshiro, 2010, IEEE, P6
[6]  
Guo H., 2010, HERO NOVEL MALWARE D, P411
[7]  
Harley D., 2009, INFORM SECURITY TECH, V14
[8]  
Hex-rays, 2013, IDA PROD DEB
[9]  
Hu X, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P611
[10]  
Idika N., 2007, SURVEY MALWARE DETEC