CADefender: Detection of unknown malicious AutoLISP computer-aided design files using designated feature extraction and machine learning methods

被引:0
|
作者
Yevsikov, Alexander [1 ,2 ]
Muralidharan, Trivikram [1 ,2 ]
Panker, Tomer [1 ,2 ]
Nissim, Nir [1 ,2 ]
机构
[1] Ben Gurion Univ Negev, Cyber Secur Res Ctr, Malware Lab, IL-8470912 Beer Sheva, Israel
[2] Ben Gurion Univ Negev, Dept Ind Engn & Management, IL-8410501 Beer Sheva, Israel
关键词
Computer-aided design; Auto list processing; Machine learning; Malware detection; Feature extraction; MALWARE DETECTION; CLASSIFICATION;
D O I
10.1016/j.engappai.2024.109414
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer-aided design (CAD) files are used to create digital designs for various structures - from the smallest chips in the high-tech industry to large-scale buildings and bridges in the civil engineering space. We found that most exploits and malicious payloads are deployed through Auto List Processing (AutoLISP) source code (LSP) or Fast Load AutoLISP (FAS) files, which are non-executable files (NEFs) containing scripts in the AutoLISP language that are native to AutoCAD; While antivirus software is capable of detecting many malicious CAD files, the potential to improve protection by using a dedicated machine learning (ML) based detection solution remains, especially against unknown and sophisticated CAD malware. In this study, we are the first to propose designated feature extraction methods and a robust framework aimed at the detection of known and unknown AutoLISP malware using ML algorithms. To accomplish this, we examined the structure, functionality, and ecosystems of AutoLISP files and collected the largest known representative collection of LSP files consisting of 6418 malicious and benign files (labeled and verified). We then explored the use of two novel static-analysis-based feature extraction methods (knowledge-based and structural) designated for LSP files to extract a discriminative set of informative features, which can subsequently be used by ML models to detect malicious LSP files. These two feature extraction methods serve as the basis of the proposed detection framework, whose performance we comprehensively compare to both widely used antiviruses and baseline ML models based on existing feature extraction methods, including MinHash, Bidirectional Encoder Representations from Transformers (BERT), and n-gram. Our results highlight our methods' contributions to the detection of unknown AutoLISP malware and demonstrate their ability to outperform existing methods. The best performance in the task of unknown malicious LSP file detection was obtained by the Artificial Neural Networks (ANN) model trained on 100 knowledgebased features, which obtained a true positive rate (TPR) of 99.49% with a false positive rate (FPR) of 0.57%. Our framework's role in explainability is also highlighted, as we also present the prominent features that contribute most to the model's detection capabilities; this information can be used for explainability purposes. We conclude by evaluating the proposed framework's ability to detect a malicious file from an unknown AutoLISP malware family and by evaluating our framework on an additional independent test set that originated from another source, scenarios that are often faced by malware detection solutions.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] A method of version merging for computer-aided design files based on feature extraction
    Sun, C.
    Guo, D.
    Gao, H.
    Zou, L.
    Wang, H.
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART C-JOURNAL OF MECHANICAL ENGINEERING SCIENCE, 2011, 225 (C2) : 463 - 471
  • [2] ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology
    Nissim, Nir
    Cohen, Aviad
    Elovici, Yuval
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (03) : 631 - 646
  • [3] Computer-aided design files as a learning tool in dental anatomy
    Reyes-Perez, Elisandra
    Latshaw, Kendall
    Meirelles, Luiz
    Weiss, Gabriela A.
    JOURNAL OF DENTAL EDUCATION, 2024, 88 : 1942 - 1944
  • [4] SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods
    Cohen, Aviad
    Nissim, Nir
    Rokach, Lior
    Elovici, Yuval
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 63 : 324 - 343
  • [5] Design of fragrance molecules using computer-aided molecular design with machine learning
    Ooi Y.J.
    Aung K.N.G.
    Chong J.W.
    Tan R.R.
    Aviso K.B.
    Chemmangattuvalappil N.G.
    Computers and Chemical Engineering, 2022, 157
  • [6] A MACHINE LEARNING APPROACH TO COMPUTER-AIDED MOLECULAR DESIGN
    BOLIS, G
    DIPACE, L
    FABROCINI, F
    JOURNAL OF COMPUTER-AIDED MOLECULAR DESIGN, 1991, 5 (06) : 617 - 628
  • [7] Editorial: Machine learning in computer-aided drug design
    Perisic, Ognjen
    Sevim Bayrak, Cigdem
    Gunady, Mohamed Khaled
    FRONTIERS IN MOLECULAR BIOSCIENCES, 2025, 12
  • [8] Computer-aided Diagnostics of Schizophrenia: Comparison of Different Feature Extraction Methods
    Radomir, Kus
    Daniel, Schwarz
    ACTA POLYTECHNICA HUNGARICA, 2017, 14 (05) : 181 - 196
  • [9] Boosting the Detection of Malicious Documents Using Designated Active Learning Methods
    Nissim, Nir
    Cohen, Aviad
    Elovici, Yuval
    2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, : 760 - 765
  • [10] The effect of feature selection methods on computer-aided detection of masses in mammograms
    Hupse, Rianne
    Karssemeijer, Nico
    PHYSICS IN MEDICINE AND BIOLOGY, 2010, 55 (10): : 2893 - 2904