A Graph Theoretic Approach to Fast and Accurate Malware Detection

被引:0
|
作者
Shafiq, Zubair [1 ]
Liu, Alex [2 ]
机构
[1] Univ Iowa, Dept Comp Sci, Iowa City, IA 52242 USA
[2] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the unavailability of signatures for previously unknown malware, non-signature malware detection schemes typically rely on analyzing program behavior. Prior behavior based non-signature malware detection schemes are either easily evadable by obfuscation or are very inefficient in terms of storage space and detection time. In this paper, we propose GZero, a graph theoretic approach fast and accurate non-signature malware detection at end hosts. GZero it is effective while being efficient in terms of both storage space and detection time. We conducted experiments on a large set of both benign software and malware. Our results show that GZero achieves more than 99% detection rate and a false positive rate of less than 1%, with less than 1 second of average scan time per program and is relatively robust to obfuscation attacks. Due to its low overheads, GZero can complement existing malware detection solutions at end hosts.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] A Fast Approach Towards Android Malware Detection
    Chi, Hongmei
    Simms, Xavier
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2015, PT I, 2015, 9155 : 77 - 89
  • [2] Fast shape retrieval using a graph theoretic approach
    Li C.
    Ben Hamza A.
    International Journal of Multimedia Information Retrieval, 2012, 1 (4) : 239 - 248
  • [3] A graph-theoretic approach for inparalog detection
    Olivier Tremblay-Savard
    Krister M Swenson
    BMC Bioinformatics, 13
  • [4] A graph-theoretic approach for inparalog detection
    Tremblay-Savard, Olivier
    Swenson, Krister M.
    BMC BIOINFORMATICS, 2012, 13
  • [5] Graph embedding as a new approach for unknown malware detection
    Hashemi H.
    Azmoodeh A.
    Hamzeh A.
    Hashemi S.
    Journal of Computer Virology and Hacking Techniques, 2017, 13 (3) : 153 - 166
  • [6] A fast malware detection model based on heterogeneous graph similarity search
    Li, Tun
    Shou, Peng
    Wan, Xin
    Li, Qian
    Wang, Rong
    Jia, Chaolong
    Xiao, Yunpeng
    COMPUTER NETWORKS, 2024, 254
  • [7] Corruption and its detection: a graph-theoretic approach
    Thebeth Rufaro Mukwembi
    Simon Mukwembi
    Computational and Mathematical Organization Theory, 2017, 23 : 293 - 300
  • [8] A graph-theoretic approach for the detection of phishing webpages
    Tan, Choon Lin
    Chiew, Kang Leng
    Yong, Kelvin S. C.
    Sze, San Nah
    Abdullah, Johari
    Sebastian, Yakub
    COMPUTERS & SECURITY, 2020, 95
  • [9] Leakage detection of heating network with graph theoretic approach
    Xianliang, Y. (xianliangyang@vip.163.com), 1600, Sila Science, University Mah Mekan Sok, No 24, Trabzon, Turkey (32):
  • [10] Corruption and its detection: a graph-theoretic approach
    Mukwembi, Thebeth Rufaro
    Mukwembi, Simon
    COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2017, 23 (02) : 293 - 300