Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph

被引:10
|
作者
Alabdulmohsin, Ibrahim [1 ]
Han, Yufei [2 ]
Shen, Yun [2 ]
Zhang, Xiangliang [1 ]
机构
[1] King Abdullah Univ Sci & Technol, Thuwal, Saudi Arabia
[2] Symantec Res Labs, Mountain View, CA USA
关键词
D O I
10.1145/2983323.2983700
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware detection has been widely studied by analysing either file dropping relationships or characteristics of the file distribution network. This paper, for the first time, studies a global heterogeneous malware delivery graph fusing file dropping relationship and the topology of the file distribution network. The integration offers a unique ability of structuring the end-to-end distribution relationship. However, it brings large heterogeneous graphs to analysis. In our study, an average daily generated graph has more than 4 million edges and 2.7 million nodes that differ in type, such as IPs, URLs, and files. We propose a novel Bayesian label propagation model to unify the multi-source information, including content-agnostic features of different node types and topological information of the heterogeneous network. Our approach does not need to examine the source codes nor inspect the dynamic behaviours of a binary. Instead, it estimates the maliciousness of a given file through a semi-supervised label propagation procedure, which has a linear time complexity w.r.t. the number of nodes and edges. The evaluation on 567 million real-world download events validates that our proposed approach efficiently detects malware with a high accuracy.
引用
收藏
页码:2395 / 2400
页数:6
相关论文
共 50 条
  • [1] CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic
    Feng, Yebo
    Li, Jun
    Sisodia, Devkishen
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 482 - 494
  • [2] Towards reliable online clickbait video detection: A content-agnostic approach
    Shang, Lanyu
    Zhang, Daniel
    Wang, Michael
    Lai, Shuyue
    Wang, Dong
    KNOWLEDGE-BASED SYSTEMS, 2019, 182
  • [3] Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails
    Gascon, Hugo
    Ullrich, Steffen
    Stritter, Benjamin
    Rieck, Konrad
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 69 - 91
  • [4] Content-Agnostic Web Browsing Quality Assessment
    Klink, Janusz
    Bardowski, Pawel
    Uhl, Tadeus
    2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2018, : 280 - 285
  • [5] Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic
    Feng, Yebo
    Li, Jun
    Jiao, Lei
    Wu, Xintao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2149 - 2163
  • [6] Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNS
    AlSabah, Mashael
    Nabeel, Mohamed
    Choo, Euijin
    Boshmaf, Yazan
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 446 - 459
  • [7] MalFire: Malware Firewall for Malicious Content Detection and Protection
    Yost, Wyatt
    Jaiswal, Chetan
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 428 - +
  • [8] SurfaceStreams: A Content-Agnostic Streaming Toolkit for Interactive Surfaces
    Echtler, Florian
    ADJUNCT PUBLICATION OF THE 31ST ANNUAL ACM SYMPOSIUM ON USER INTERFACE SOFTWARE AND TECHNOLOGY (UIST'18 ADJUNCT), 2018, : 10 - 12
  • [9] Heterogeneous Graph Neural Networks for Malicious Account Detection
    Liu, Ziqi
    Chen, Chaochao
    Yang, Xinxing
    Zhou, Jun
    Li, Xiaolong
    Song, Le
    CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2018, : 2077 - 2085
  • [10] Slicepedia: Content-Agnostic Slicing Resource Production for Adaptive Hypermedia
    Levacher, Killian
    Lawless, Seamus
    Wade, Vincent
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (01) : 393 - 417