An Efficient Common Substrings Algorithm for On-the-Fly Behavior-Based Malware Detection and Analysis

被引:0
|
作者
Acosta, Jaime C. [1 ]
Mendoza, Humberto [1 ]
Medina, Brenda G. [1 ]
机构
[1] USA, Res Lab, White Sands Missile Range, NM 88002 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
It is well known that malware (worms, botnets, etc...) thrive on communication systems. The process of detecting and analyzing malware is very latent and not well-suited for real-time application, which is critical especially for propagating malware. For this reason, recent methods identify similarities among malware dynamic trace logs to extract malicious behavior snippets. These snippets can then be tagged by a human analyst and be used to identify malware on-the-fly. A major problem with these methods is that they require extensive processing resources. This is especially due to the large amount of malware released each year (upwards of 17 million new instances in 2011). In this paper, we present an efficient algorithm for identifying common substrings in dynamic trace events of malware collections. The algorithm finds common substrings between malware pairs in theoretical linear time by using parallel processing. The algorithm is implemented in the CUDA and results show a performance increase of up to 8 times compared to previous implementations.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification
    Mohaisen, Aziz
    Alrawi, Omar
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2014, 2015, 8909 : 107 - 121
  • [32] AMAL: High-fidelity, behavior-based automated malware analysis and classification
    Mohaisen, Aziz
    Alrawi, Omar
    Mohaisen, Manar
    [J]. COMPUTERS & SECURITY, 2015, 52 : 251 - 266
  • [33] Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android
    Sun, Mingshen
    Li, Xiaolei
    Lui, John C. S.
    Ma, Richard T. B.
    Liang, Zhenkai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1103 - 1112
  • [34] A Study on Behavior-Based Mobile Malware Analysis System Against Evasion Techniques
    Kim, Mijoo
    Shin, Youngsang
    Lee, Tae Jin
    Youm, Heung Youl
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2016, : 455 - 457
  • [35] BejaGNN: behavior-based Java']Java malware detection via graph neural network
    Feng, Pengbin
    Yang, Li
    Lu, Di
    Xi, Ning
    Ma, Jianfeng
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (14): : 15390 - 15414
  • [36] Efficient on-the-fly Algorithm for Checking Alternating Timed Simulation
    Bulychev, Peter
    Chatain, Thomas
    David, Alexandre
    Larsen, Kim G.
    [J]. FORMAL MODELING AND ANALYSIS OF TIMED SYSTEMS, PROCEEDINGS, 2009, 5813 : 73 - 87
  • [37] Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks
    Rahbarinia, Babak
    Perdisci, Roberto
    Antonakakis, Manos
    [J]. 2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, : 403 - 414
  • [38] Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks
    Rahbarinia, Babak
    Perdisci, Roberto
    Antonakakis, Manos
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2016, 19 (02)
  • [39] Efficient on-the-fly algorithms for the analysis of timed games
    Cassez, F
    David, A
    Fleury, E
    Larsen, KG
    Lime, D
    [J]. CONCUR 2005 - CONCURRENCY THEORY, PROCEEDINGS, 2005, 3653 : 66 - 80
  • [40] A space efficient algorithm for the longest common subsequence in k-length substrings
    Zhu, Daxin
    Wang, Lei
    Wang, Tinran
    Wang, Xiaodong
    [J]. THEORETICAL COMPUTER SCIENCE, 2017, 687 : 79 - 92