Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3058060.3058065acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccspConference Proceedingsconference-collections
research-article

MGeT: Malware Gene-Based Malware Dynamic Analyses

Published: 17 March 2017 Publication History

Abstract

Malware, as a malicious software, or applications or execution codes, has become the centerpiece of most security threats in such a unceasing open Internet environment. The essential technology of malware analysis is to extract the characteristics of malware, intended to supply signatures to detection systems and provide evidence for recovery and cleanup. The focal point in the malware analysis is how to detect malicious behaviors versus how to hide a malware analyzer from malware during runtime. In this paper, we propose an approach called Malware Gene Topology Model (MGeT) inspired by Biotechnological Genomics that can quickly detect potential malware from a large amount of software or execution codes including metamorphic or new variants of malware. Instead of extracting the signatures from the malware in the execution file level or operating system level, we identify the key malicious behaviors of malware by the underlying instructions, named malware Gene. We evaluate our method based on real-world datasets and the results demonstrate the advantages of our method over the previous studies, validating the contribution of our method.

References

[1]
Egele, M., Scholte, T., Kirda, E., and Kruegel, C. A survey on automated dynamic malware-analysis techniques and tools. ACM Computing Surveys (CSUR), 44(2):6, 2012.
[2]
Szor, P. The art of computer virus research and defense. Pearson Education, 2005.
[3]
Company, S. Internet security report of china in the year 2015. http://www.360doc.com/content, 2015.
[4]
McAfee, N. L. Estimating the global cost of cybercrime. economic impact of cybercrime ii, mcafee, junio de 2014.
[5]
Moser, A., Kruegel, C., and Kirda, E. Limits of static analysis for malware detection. In Computer security applications conference, 2007. ACSAC 2007. Twenty-third annual, pages 421--430. IEEE, 2007.
[6]
Ye, D. Wang, T., Li, D. Y., and Jiang, Q. An intelligent pe-malware detection system based on association mining. Journal in computer virology, 4(4):323--334, 2008.
[7]
Ramadass, S. Malware detection based on evolving clustering method for classification. Scientific Research and Essays, 7(22):2031--2036, 2012.
[8]
Annachhatre, C., Austin, T. H., and Stamp, M. Hidden markov models for malware classification. Journal of Computer Virology and Hacking Techniques, 11(2):59--73, 2015.
[9]
Kong, D. and Yan, G. Discriminant malware distance learning on structural information for automated malware classification. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1357--1365. ACM, 2013.
[10]
Nataraj, L., Karthikeyan, S., Jacob, G., and Manjunath, B. Malware images: visualization and automatic classification. In Proceedings of the 8th international symposium on visualization for cyber security, page 4. ACM, 2011.
[11]
Anderson, B., Quist, D., Neil, J., Storlie, C., and Lane, T. Graph-based malware detection using dynamic analysis. Journal in Computer Virology, 7(4):247--258, 2011.
[12]
Nari, S., and Ghorbani, A. A. Automated malware classification based on network behavior. In Computing, Networking and Communications (ICNC), 2013 International Conference on, pages 642--647. IEEE, 2013.
[13]
Sandbox, N. Norman sandbox whitepaper, 2010.
[14]
Bayer, U., Kruegel, C., and Kirda, E. Anubis: Analyzing unknown binaries, 2009.
[15]
Caballero, J., Yin, H., Liang, Z., and Song, D. Polyglot: Automatic extraction of protocol message format using Dynamic binary analysis. In Proceedings of the 14th ACM conference on Computer and communications security, pages 317--329. ACM, 2007.
[16]
Elhadi, A. A. E., Maarof, M. A., and Osman, A. H. Malware detection based on hybrid signature behaviour application programming interface call graph. American Journal of Applied Sciences, 9(3):283, 2012.
[17]
Ye, L., and Keogh, E. Time series shapelets: a new primitive for data mining. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 947--956. ACM, 2009.
[18]
Hou, L., Kwok, J. T., and Zurada, J. M. Efficient learning of time series shapelets. In Thirtieth AAAI Conference on Artificial Intelligence, 2016.
[19]
Imran, M., Afzal, M. T., and Qadir, M. A. Using hidden markov model for dynamic malware analysis: First impressions. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on, pages 816--821. IEEE, 2015.
[20]
Rieck, K., Trinius, P., Willems, C., and Holz, T. Automatic analysis of malware behavior using machine learning. Journal of Computer Security, 19(4):639--668, 2011.

Cited By

View all
  • (2022)A Malware Classification Method based on Attentive Bidirectional Model2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP)10.1109/ICSP54964.2022.9778322(1362-1369)Online publication date: 15-Apr-2022
  • (2022)A PV-DM-based feature fusion method for binary malware clustering2022 4th International Conference on Communications, Information System and Computer Engineering (CISCE)10.1109/CISCE55963.2022.9851172(114-118)Online publication date: 27-May-2022
  • (2021)RansomLens: Understanding Ransomware via Causality Analysis on System Provenance GraphScience of Cyber Security10.1007/978-3-030-89137-4_18(252-267)Online publication date: 10-Oct-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCSP '17: Proceedings of the 2017 International Conference on Cryptography, Security and Privacy
March 2017
153 pages
ISBN:9781450348676
DOI:10.1145/3058060
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Wuhan Univ.: Wuhan University, China

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Malware Gene
  2. Malware analysis
  3. Security and Protection

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCSP '17

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)A Malware Classification Method based on Attentive Bidirectional Model2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP)10.1109/ICSP54964.2022.9778322(1362-1369)Online publication date: 15-Apr-2022
  • (2022)A PV-DM-based feature fusion method for binary malware clustering2022 4th International Conference on Communications, Information System and Computer Engineering (CISCE)10.1109/CISCE55963.2022.9851172(114-118)Online publication date: 27-May-2022
  • (2021)RansomLens: Understanding Ransomware via Causality Analysis on System Provenance GraphScience of Cyber Security10.1007/978-3-030-89137-4_18(252-267)Online publication date: 10-Oct-2021
  • (2020)A Malware Classification Method Based on the Capsule NetworkMachine Learning for Cyber Security10.1007/978-3-030-62223-7_4(35-49)Online publication date: 11-Nov-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media