Detecting Malware Activities With MalpMiner: A Dynamic Analysis Approach

被引:2
|
作者
Abdelwahed, Mustafa F. [1 ,2 ]
Kamal, Mustafa M. [2 ]
Sayed, Samir G. [2 ,3 ]
机构
[1] Helwan Univ, Fac Engn, Dept Comp & Syst Engn, Cairo 11792, Egypt
[2] Natl Telecom Regulatory Author NTRA, Egyptian Comp Emergency Readiness Team EG CERT, Cairo 12971, Egypt
[3] Helwan Univ, Fac Engn, Dept Elect & Commun Engn, Cairo 11792, Egypt
关键词
Cybersecurity; artificial intelligence; answer set programming; malware behaviour detec-tion; logic programming; emulation;
D O I
10.1109/ACCESS.2023.3266562
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Day by day, malware as a service becomes more popular and easy to acquire, thus allowing anyone to start an attack without any technical background, which in turn introduces challenges for detecting such attacks. One of those challenges is the detection of malware activities early to prevent harm as much as possible. This paper presents a trusted dynamic analysis approach based on Answer Set Programming (ASP), a logic engine inference named Malware-Logic-Miner (MalpMiner). ASP is a nonmonotonic reasoning engine built on an open-world assumption, which allows MalpMiner to adopt commonsense reasoning when capturing malware activities of any given binary. Furthermore, MalpMiner requires no prior training; therefore, it can scale up quickly to include more malware-attack attributes. Moreover, MalpMiner considers the invoked application programming interfaces' values, resulting in correct malware behaviour modelling. The baseline experiments prove the correctness of MalpMiner related to recognizing malware activities. Moreover, MalpMiner achieved a detection ratio of 99% with a false-positive rate of less than 1% while maintaining low computational costs and explaining the detection decision.
引用
收藏
页码:84772 / 84784
页数:13
相关论文
共 50 条
  • [1] Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis
    Darabian, Hamid
    Homayounoot, Sajad
    Dehghantanha, Ali
    Hashemi, Sattar
    Karimipour, Hadis
    Parizi, Reza M.
    Choo, Kim-Kwang Raymond
    JOURNAL OF GRID COMPUTING, 2020, 18 (02) : 293 - 303
  • [2] Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis
    Hamid Darabian
    Sajad Homayounoot
    Ali Dehghantanha
    Sattar Hashemi
    Hadis Karimipour
    Reza M. Parizi
    Kim-Kwang Raymond Choo
    Journal of Grid Computing, 2020, 18 : 293 - 303
  • [3] Malware Analysis: The Art of Detecting Malicious Activities
    El-moussa, Fadi
    Jones, Andy
    PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 51 - 59
  • [4] Detecting Intelligent Malware on Dynamic Android Analysis Environments
    Singh, Shirish
    Mishra, Bharavi
    Singh, Saket
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 414 - 419
  • [5] A New Malware Classification Approach Based on Malware Dynamic Analysis
    Fang, Ying
    Yu, Bo
    Tang, Yong
    Liu, Liu
    Lu, Zexin
    Wang, Yi
    Yang, Qiang
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 173 - 189
  • [6] A static heuristic approach to detecting malware targets
    Zakeri, Mohaddeseh
    Daneshgar, Fatemeh Faraji
    Abbaspour, Maghsoud
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3015 - 3027
  • [7] Analysis and Evaluation of Antivirus Engines in Detecting Android Malware: A Data Analytics Approach
    Martin, Ignacio
    Alberto Hernandez, Jose
    de los Santos, Sergio
    Guzman, Antonio
    2018 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2018, : 7 - 14
  • [8] A Deep Learning Approach for Detecting Malware Using Autoencoder
    Panchagnula, Venu Madhav
    Satya Keerthi, N.V.L.Ch.
    Surekha, S.
    Sujatha, R.
    Veeraiah, Duggineni
    Ramesh, Eluri
    Lakshmi, B.
    IAENG International Journal of Computer Science, 2024, 51 (08) : 1051 - 1059
  • [9] Structural Feature Engineering approach for detecting polymorphic malware
    Masabo, Emmanuel
    Kaawaase, Kyanda Swaib
    Sansa-Otim, Julianne
    Hanyurwimfura, Damien
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 716 - 721
  • [10] An approach to dynamic malware analysis based on system and application code split
    Anastasia Pereberina
    Alexey Kostyushko
    Alexander Tormasov
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 231 - 241