An Efficient Common Substrings Algorithm for On-the-Fly Behavior-Based Malware Detection and Analysis

被引:0
|
作者
Acosta, Jaime C. [1 ]
Mendoza, Humberto [1 ]
Medina, Brenda G. [1 ]
机构
[1] USA, Res Lab, White Sands Missile Range, NM 88002 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
It is well known that malware (worms, botnets, etc...) thrive on communication systems. The process of detecting and analyzing malware is very latent and not well-suited for real-time application, which is critical especially for propagating malware. For this reason, recent methods identify similarities among malware dynamic trace logs to extract malicious behavior snippets. These snippets can then be tagged by a human analyst and be used to identify malware on-the-fly. A major problem with these methods is that they require extensive processing resources. This is especially due to the large amount of malware released each year (upwards of 17 million new instances in 2011). In this paper, we present an efficient algorithm for identifying common substrings in dynamic trace events of malware collections. The algorithm finds common substrings between malware pairs in theoretical linear time by using parallel processing. The algorithm is implemented in the CUDA and results show a performance increase of up to 8 times compared to previous implementations.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Lightweight Behavior-Based Malware Detection
    Anisetti, Marco
    Ardagna, Claudio A.
    Bena, Nicola
    Giandomenico, Vincenzo
    Gianini, Gabriele
    [J]. MANAGEMENT OF DIGITAL ECOSYSTEMS, MEDES 2023, 2024, 2022 : 237 - 250
  • [2] A BEHAVIOR-BASED APPROACH FOR MALWARE DETECTION
    Mosli, Rayan
    Li, Rui
    Yuan, Bo
    Pan, Yin
    [J]. ADVANCES IN DIGITAL FORENSICS XIII, 2017, 511 : 187 - 201
  • [3] MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention
    Saracino, Andrea
    Sgandurra, Daniele
    Dini, Gianluca
    Martinelli, Fabio
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (01) : 83 - 97
  • [4] Behavior-based features model for malware detection
    Galal H.S.
    Mahdy Y.B.
    Atiea M.A.
    [J]. Journal of Computer Virology and Hacking Techniques, 2016, 12 (2) : 59 - 67
  • [5] Behavior-Based Malware Detection on Mobile Phone
    Dai, Shuaifu
    Liu, Yaxin
    Wang, Tielei
    Wei, Tao
    Zou, Wei
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [6] A Study on The behavior-based Malware Detection Signature
    Oh, Sungtaek
    Go, Woong
    Lee, Taejin
    [J]. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 663 - 670
  • [7] On Behavior-based Detection of Malware on Android Platform
    Yu, Wei
    Zhang, Hanlin
    Ge, Linqiang
    Hardy, Rommie
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 814 - 819
  • [8] Holography: a behavior-based profiler for malware analysis
    Dai, Shih-Yao
    Fyodor, Yarochkin
    Wu, Ming-Wei
    Huang, Yennun
    Kuo, Sy-Yen
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2012, 42 (09): : 1107 - 1136
  • [9] A Framework for Behavior-Based Malware Analysis in the Cloud
    Martignoni, Lorenzo
    Paleari, Roberto
    Bruschi, Danilo
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 178 - +
  • [10] Shikra: A behavior-based Android malware detection framework
    Ma Zhao-hui
    Chen Zi-hao
    Wang Xin-ming
    Nic Rui-hua
    Zhao Gan-sen
    Wu Jie-chao
    Ren Xue-qi
    [J]. 2017 INTERNATIONAL CONFERENCE ON GREEN INFORMATICS (ICGI), 2017, : 175 - 184