A Novel Information Fusion Model for Assessment of Malware Threat

被引:1
作者
Dai, Chao [1 ]
Pang, Jianmin [1 ]
Zhang, Xiaochuan [1 ]
Liang, Guanghui [1 ]
Bai, Hong [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp China, Zhengzhou, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2016年 / 10卷 / 05期
基金
中国国家自然科学基金;
关键词
information fusion; malware analysis; threat assessment; static analysis; real-time monitor;
D O I
10.14257/ijsia.2016.10.5.01
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is not only important for security analysts to judge some binary code is malicious or not, but also to understand the malware "what to do" and "what's the impact it posed on our information system". In this paper, we proposed a novel information fusion model to quantitate the threat of malware. The model consists of three levels: the decision making level information fusion, the attribute level information fusion and the behavior level information fusion. These three levels portray special characteristics of malware threat distributed in the assessment model. Combined with the static analysis technology and real-time monitor technology, we implemented a framework of malware threat assessment. The experiment demonstrates that our information fusion model for malware threat assessment is effective to quantitate the threat of malware in accuracy and differentiation degree. In the end, we discussed several issues that could improve the performance of the model.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 25 条
[1]  
Alam S., 2014, COMPUT J
[2]  
[Anonymous], 2013, P 29 ANN COMP SEC AP
[3]  
Bagnall R J., 2011, P 6 INT COMM CONTR R
[4]  
Bailey M, 2007, LECT NOTES COMPUT SC, V4637, P178
[5]  
Dell SecureWorks Inc, 2015, MALW COD AN
[6]   A survey on software architecture analysis methods [J].
Dobrica, L ;
Niemelä, E .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (07) :638-653
[7]  
FireEye Inc, 2015, AD DEF REQ THREAT IN
[8]  
Fu-yong Z, 2011, J S CHINA U TECHNOLO, V4
[9]  
FuYong Z, 2009, COMP NETW MULT TECHN, P1
[10]  
Han Y, 2014, RES MALWARE DETECTIO