Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph

被引:10
|
作者
Alabdulmohsin, Ibrahim [1 ]
Han, Yufei [2 ]
Shen, Yun [2 ]
Zhang, Xiangliang [1 ]
机构
[1] King Abdullah Univ Sci & Technol, Thuwal, Saudi Arabia
[2] Symantec Res Labs, Mountain View, CA USA
关键词
D O I
10.1145/2983323.2983700
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware detection has been widely studied by analysing either file dropping relationships or characteristics of the file distribution network. This paper, for the first time, studies a global heterogeneous malware delivery graph fusing file dropping relationship and the topology of the file distribution network. The integration offers a unique ability of structuring the end-to-end distribution relationship. However, it brings large heterogeneous graphs to analysis. In our study, an average daily generated graph has more than 4 million edges and 2.7 million nodes that differ in type, such as IPs, URLs, and files. We propose a novel Bayesian label propagation model to unify the multi-source information, including content-agnostic features of different node types and topological information of the heterogeneous network. Our approach does not need to examine the source codes nor inspect the dynamic behaviours of a binary. Instead, it estimates the maliciousness of a given file through a semi-supervised label propagation procedure, which has a linear time complexity w.r.t. the number of nodes and edges. The evaluation on 567 million real-world download events validates that our proposed approach efficiently detects malware with a high accuracy.
引用
收藏
页码:2395 / 2400
页数:6
相关论文
共 50 条
  • [31] Hawk: Rapid Android Malware Detection Through Heterogeneous Graph Attention Networks
    Hei, Yiming
    Yang, Renyu
    Peng, Hao
    Wang, Lihong
    Xu, Xiaolin
    Liu, Jianwei
    Liu, Hong
    Xu, Jie
    Sun, Lichao
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (04) : 4703 - 4717
  • [32] Heterogeneous Temporal Graph Transformer: An Intelligent System for Evolving Android Malware Detection
    Fan, Yujie
    Ju, Mingxuan
    Hou, Shifu
    Ye, Yanfang
    Wan, Wenqiang
    Wang, Kui
    Mei, Yinming
    Xiong, Qi
    KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 2831 - 2839
  • [33] Code graph for malware detection
    Jeong, Kyoochang
    Lee, Heejo
    2008 THE INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2008, : 137 - +
  • [34] Detecting Malicious Landing Pages in Malware Distribution Networks
    Wang, Gang
    Stokes, Jack W.
    Herley, Cormac
    Felstead, David
    2013 43RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2013,
  • [35] A Clone-based Analysis of the Content-Agnostic Factors Driving News Article Popularity on Twitter
    Mohammadinodooshan, Alireza
    Holmgren, William
    Christensson, Martin
    Carlsson, Niklas
    PROCEEDINGS OF THE 2023 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING, ASONAM 2023, 2023, : 17 - 24
  • [36] The Fake News Vaccine A Content-Agnostic System for Preventing Fake News from Becoming Viral
    Balmau, Oana
    Guerraoui, Rachid
    Kermarrec, Anne-Marie
    Maurer, Alexandre
    Pavlovic, Matej
    Zwaenepoel, Willy
    NETWORKED SYSTEMS, NETYS 2019, 2019, 11704 : 347 - 364
  • [37] MsDroid: Identifying Malicious Snippets for Android Malware Detection
    He, Yiling
    Li, Yiping
    Wu, Lei
    Yang, Ziqi
    Ren, Kui
    Qin, Zhan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2025 - 2039
  • [38] Visual malware detection using local malicious pattern
    Hashem Hashemi
    Ali Hamzeh
    Journal of Computer Virology and Hacking Techniques, 2019, 15 : 1 - 14
  • [39] Visual malware detection using local malicious pattern
    Hashemi, Hashem
    Hamzeh, Ali
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2019, 15 (01) : 1 - 14
  • [40] Malicious sequential pattern mining for automatic malware detection
    Fan, Yujie
    Ye, Yanfang
    Chen, Lifei
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 52 : 16 - 25