Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3318236.3318255acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicgdaConference Proceedingsconference-collections
research-article

An Opcode Sequences Analysis Method For Unknown Malware Detection

Published: 15 March 2019 Publication History
  • Get Citation Alerts
  • Abstract

    One of the main challenges in security today is defending against unknown malware attacks which have the potential to harm a computer or network. Hence, detecting malware has become one of the most important challenges for the security of computer systems. The known malware detection methods based on the appearance of opcode sequences has to construct a matrix from programs of different architectures to extract high-level features. In order to resolve high dimensional inputs vector and differences assembly instruction, this paper proposes a novel method for detecting static characteristics of 32-bit and 64-bit malicious Portable Executable (PE) Windows files by opcode sequences analysis. By compute the frequency of occurrence of each opcode sequence and distinguishing different types of 32-bit and 64-bit PE files, the proposed method shows promising results with less complexity in comparison with previous studies, which is beneficial to train machine learning model such as k-nearest neighbor (KNN) and back-propagation neural network (BP). Our method is evaluated on more than 20,000 samples, and experimental results show that our system can effectively detect and classify unknown malware.

    References

    [1]
    G. McGraw, G. Morrisett. Attacking malicious code: A report to the infosec research council, In Proceedings of IEEE Software, 2000, pp 33--41.
    [2]
    Bazrafshan, Zahra, Hashem Hashemi, Seyed Mehdi Hazrati Fard, and Ali Hamzeh. A survey on heuristic malware detection techniques. In Information and Knowledge Technology (IKT), 2013 5th Conference on, 2013, pp. 113--120. IEEE.
    [3]
    Baig, Mirza, Pavol Zavarsky, Ron Ruhl, and Dale Lindskog. The study of evasion of packed pe from static detection. In Internet Security (WorldCIS), 2012 World Congress on, 2012, pp. 99--104. IEEE.
    [4]
    Damshenas, Mohsen, Ali Dehghantanha, and Ramlan Mahmoud. A survey on malware propagation, analysis, and detection. International Journal of Cyber-Security and Digital Forensics 2.4, 2013, 10--30.
    [5]
    David, O.E. and Netanyahu, N.S., 2015, July. Deepsign: Deep learning for automatic malware signature generation and classification. In Neural Networks (IJCNN), 2015 International Joint Conference on, 2015, pp. 1--8. IEEE.
    [6]
    Bilar D. Opcodes as predictor for malware. International journal of electronic security and digital forensics. 2007 Jan 1;1(2):156--68.
    [7]
    Santos, Igor, Felix Brezo, Xabier Ugarte-Pedrero, and Pablo G. Bringas. Opcode sequences as representation of executables for data-mining-based unknown malware detection. Information Sciences 231 2013: 64--82.
    [8]
    Hashemi, Hashem, Amin Azmoodeh, Ali Hamzeh, and Sattar Hashemi. Graph embedding as a new approach for unknown malware detection. Journal of Computer Virology and Hacking Techniques 13, no. 3 2017: 153--166.
    [9]
    Manavi, Farnoush, and Ali Hamzeh. A new method for malware detection using opcode visualization. In Artificial Intelligence and Signal Processing Conference (AISP), 2017, pp. 96--102. IEEE.
    [10]
    Schultz, Matthew G., Eleazar Eskin, F. Zadok, and Salvatore J. Stolfo. Data mining methods for detection of new malicious executables. In Security and Privacy, 2001. S&P 2001. Proceedings. 2001 IEEE Symposium on, pp. 38--49. IEEE.
    [11]
    Kolter, J. Zico, and Marcus A. Maloof. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research 7. Dec, 2006, pp: 2721--2744.
    [12]
    Ye, Yanfang, Tao Li, Kai Huang, Qingshan Jiang, and Yong Chen. Hierarchical associative classifier (HAC) for malware detection from the large and imbalanced gray list. Journal of Intelligent Information Systems 35, no. 1 2010: 1--20.
    [13]
    Blei, David M., Andrew Y. Ng, and Michael I. Jordan. Latent dirichlet allocation. Journal of machine Learning research 3, no. Jan 2003: 993--1022.
    [14]
    Lin, F., Cohen, W.W. Power iteration clustering. In Proceedings of the 27th International Conference on Machine Learning (ICML- 10), 2010, pp. 655--662

    Cited By

    View all

    Index Terms

    1. An Opcode Sequences Analysis Method For Unknown Malware Detection

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICGDA '19: Proceedings of the 2019 2nd International Conference on Geoinformatics and Data Analysis
      March 2019
      156 pages
      ISBN:9781450362450
      DOI:10.1145/3318236
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      In-Cooperation

      • Department of Informatics, University of Oslo

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 March 2019

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Malware detection
      2. classification
      3. computer security
      4. machine learning

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICGDA 2019

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)35
      • Downloads (Last 6 weeks)8
      Reflects downloads up to 26 Jul 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Hybrid Optimization Model for Efficient Detection and Classification of Malware in the Internet of ThingsMathematics10.3390/math1210143712:10(1437)Online publication date: 7-May-2024
      • (2024)MeMalDetComputers and Security10.1016/j.cose.2024.103864142:COnline publication date: 1-Jul-2024
      • (2024)DawnGNN: Documentation augmented windows malware detection using graph neural networkComputers & Security10.1016/j.cose.2024.103788(103788)Online publication date: Mar-2024
      • (2024)A robust method for malware analysis using stacking classifiers and dendrogram visualizationInternational Journal of Information Technology10.1007/s41870-024-01982-zOnline publication date: 9-Jul-2024
      • (2023)An Efficient Boosting-Based Windows Malware Family Classification System Using Multi-Features FusionApplied Sciences10.3390/app1306406013:6(4060)Online publication date: 22-Mar-2023
      • (2023)A systematic literature review on windows malware detection: Techniques, research issues, and future directionsJournal of Systems and Software10.1016/j.jss.2023.111921(111921)Online publication date: Dec-2023
      • (2023)API-MalDetectJournal of Network and Computer Applications10.1016/j.jnca.2023.103704218:COnline publication date: 1-Sep-2023
      • (2022)Evaluating Feature Robustness for Windows Malware Family Classification2022 International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN54977.2022.9868914(1-10)Online publication date: Jul-2022
      • (2022)Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)10.1109/CCWC54503.2022.9720874(0745-0751)Online publication date: 26-Jan-2022
      • (2022)HeuCrip: a malware detection approach for internet of battlefield thingsCluster Computing10.1007/s10586-022-03618-y26:2(977-992)Online publication date: 3-Aug-2022
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media