CADefender: Detection of unknown malicious AutoLISP computer-aided design files using designated feature extraction and machine learning methods

被引:0
|
作者
Yevsikov, Alexander [1 ,2 ]
Muralidharan, Trivikram [1 ,2 ]
Panker, Tomer [1 ,2 ]
Nissim, Nir [1 ,2 ]
机构
[1] Ben Gurion Univ Negev, Cyber Secur Res Ctr, Malware Lab, IL-8470912 Beer Sheva, Israel
[2] Ben Gurion Univ Negev, Dept Ind Engn & Management, IL-8410501 Beer Sheva, Israel
关键词
Computer-aided design; Auto list processing; Machine learning; Malware detection; Feature extraction; MALWARE DETECTION; CLASSIFICATION;
D O I
10.1016/j.engappai.2024.109414
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer-aided design (CAD) files are used to create digital designs for various structures - from the smallest chips in the high-tech industry to large-scale buildings and bridges in the civil engineering space. We found that most exploits and malicious payloads are deployed through Auto List Processing (AutoLISP) source code (LSP) or Fast Load AutoLISP (FAS) files, which are non-executable files (NEFs) containing scripts in the AutoLISP language that are native to AutoCAD; While antivirus software is capable of detecting many malicious CAD files, the potential to improve protection by using a dedicated machine learning (ML) based detection solution remains, especially against unknown and sophisticated CAD malware. In this study, we are the first to propose designated feature extraction methods and a robust framework aimed at the detection of known and unknown AutoLISP malware using ML algorithms. To accomplish this, we examined the structure, functionality, and ecosystems of AutoLISP files and collected the largest known representative collection of LSP files consisting of 6418 malicious and benign files (labeled and verified). We then explored the use of two novel static-analysis-based feature extraction methods (knowledge-based and structural) designated for LSP files to extract a discriminative set of informative features, which can subsequently be used by ML models to detect malicious LSP files. These two feature extraction methods serve as the basis of the proposed detection framework, whose performance we comprehensively compare to both widely used antiviruses and baseline ML models based on existing feature extraction methods, including MinHash, Bidirectional Encoder Representations from Transformers (BERT), and n-gram. Our results highlight our methods' contributions to the detection of unknown AutoLISP malware and demonstrate their ability to outperform existing methods. The best performance in the task of unknown malicious LSP file detection was obtained by the Artificial Neural Networks (ANN) model trained on 100 knowledgebased features, which obtained a true positive rate (TPR) of 99.49% with a false positive rate (FPR) of 0.57%. Our framework's role in explainability is also highlighted, as we also present the prominent features that contribute most to the model's detection capabilities; this information can be used for explainability purposes. We conclude by evaluating the proposed framework's ability to detect a malicious file from an unknown AutoLISP malware family and by evaluating our framework on an additional independent test set that originated from another source, scenarios that are often faced by malware detection solutions.
引用
收藏
页数:25
相关论文
共 50 条
  • [21] Machine learning for computer-aided polyp detection using wavelets and content-based image
    Viscaino, Michelle
    Auat Cheein, Fernando
    2019 41ST ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2019, : 961 - 965
  • [22] EFFICIENT MACHINE LEARNING FRAMEWORK FOR COMPUTER-AIDED DETECTION OF CEREBRAL MICROBLEEDS USING THE RADON TRANSFORM
    Faziollahi, Amir
    Meriaudeau, Fabrice
    Villemagne, Victor L.
    Rowe, Christopher C.
    Yates, Paul
    Salvadol, Olivier
    Bourgeat, Pierrick
    2014 IEEE 11TH INTERNATIONAL SYMPOSIUM ON BIOMEDICAL IMAGING (ISBI), 2014, : 113 - 116
  • [23] Computer-Aided Detection and Diagnosis of Thyroid Nodules Using Machine and Deep Learning Classification Algorithms
    Shankarlal, B.
    Sathya, P. D.
    Sakthivel, V. P.
    IETE JOURNAL OF RESEARCH, 2023, 69 (02) : 995 - 1006
  • [24] Prediction of FLG genotype using human and computer-aided phenotype extraction with random forest machine learning
    Thomas, Bjorn R.
    Steele, Lloyd
    Tanaka, Reiko J.
    O'Toole, Edel A.
    BRITISH JOURNAL OF DERMATOLOGY, 2022, 187 : 44 - 45
  • [25] Prediction of FLG genotype using human and computer-aided phenotype extraction with random forest machine learning
    Thomas, Bjorn R.
    Steele, Lloyd
    Tanaka, Reiko J.
    O'Toole, Edel A.
    BRITISH JOURNAL OF DERMATOLOGY, 2022, 187 : 195 - 196
  • [26] Feature Selection for Malicious Detection on Industrial IoT Using Machine Learning
    Chuang, Hong-Yu
    Chen, Ruey-Maw
    SENSORS AND MATERIALS, 2024, 36 (03) : 1035 - 1046
  • [27] FEATURE-EXTRACTION TECHNIQUES FOR A COMPUTER-AIDED SYSTEM FOR DETECTION OF MICROCALCIFICATIONS IN DIGITAL MAMMOGRAMS
    CHAN, HP
    DOI, K
    METZ, CE
    LAM, KL
    SCHMIDT, RA
    MEDICAL PHYSICS, 1987, 14 (03) : 493 - 493
  • [29] Computer-aided tuning of cavity filters using kernel machine learning
    Zhou, Jin-Zhu
    Zhang, Fu-Shun
    Huang, Jin
    Tang, Bo
    Xiong, Chang-Wu
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (06): : 1274 - 1279
  • [30] Detection of Malicious PDF Files Using a Two-Stage Machine Learning Algorithm
    HE Kang
    ZHU Yuefei
    HE Yubo
    LIU Long
    LU Bin
    LIN Wei
    ChineseJournalofElectronics, 2020, 29 (06) : 1165 - 1177