Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph

被引:10
|
作者
Alabdulmohsin, Ibrahim [1 ]
Han, Yufei [2 ]
Shen, Yun [2 ]
Zhang, Xiangliang [1 ]
机构
[1] King Abdullah Univ Sci & Technol, Thuwal, Saudi Arabia
[2] Symantec Res Labs, Mountain View, CA USA
关键词
D O I
10.1145/2983323.2983700
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware detection has been widely studied by analysing either file dropping relationships or characteristics of the file distribution network. This paper, for the first time, studies a global heterogeneous malware delivery graph fusing file dropping relationship and the topology of the file distribution network. The integration offers a unique ability of structuring the end-to-end distribution relationship. However, it brings large heterogeneous graphs to analysis. In our study, an average daily generated graph has more than 4 million edges and 2.7 million nodes that differ in type, such as IPs, URLs, and files. We propose a novel Bayesian label propagation model to unify the multi-source information, including content-agnostic features of different node types and topological information of the heterogeneous network. Our approach does not need to examine the source codes nor inspect the dynamic behaviours of a binary. Instead, it estimates the maliciousness of a given file through a semi-supervised label propagation procedure, which has a linear time complexity w.r.t. the number of nodes and edges. The evaluation on 567 million real-world download events validates that our proposed approach efficiently detects malware with a high accuracy.
引用
收藏
页码:2395 / 2400
页数:6
相关论文
共 50 条
  • [41] On the use of artificial malicious patterns for android malware detection
    Jerbi, Manel
    Dagdia, Zaineb Chelly
    Bechikh, Slim
    Ben Said, Lamjed
    COMPUTERS & SECURITY, 2020, 92 (92)
  • [42] A layered classification for malicious function identification and malware detection
    Liu, Ting
    Guan, Xiaohong
    Qu, Yu
    Sun, Yanan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (11): : 1169 - 1179
  • [43] HertDroid: Android Malware Detection Method with Influential Node Filter and Heterogeneous Graph Transformer
    Meng, Xinyi
    Li, Daofeng
    APPLIED SCIENCES-BASEL, 2024, 14 (08):
  • [44] Z2F: Heterogeneous graph-based Android malware detection
    Ma, Ziwei
    Luktarhan, Nurbor
    PLOS ONE, 2024, 19 (03):
  • [45] Malware Detection based on Graph Classification
    Khanh-Huu-The Dam
    Touili, Tayssir
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 455 - 463
  • [46] Automatic Detection and Analysis towards Malicious Behavior in IoT Malware
    Li, Sen
    Ge, Mengmeng
    Feng, Ruitao
    Li, Xiaohong
    Lam, Kwok Yan
    2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 1332 - 1341
  • [47] Malware Hiding Malicious Code in the Image and its Detection Method
    Kumagai, Ryo
    Takemoto, Shu
    Nozaki, Yusuke
    Yoshikawa, Masaya
    IEEJ Transactions on Electronics, Information and Systems, 2022, 142 (12): : 1288 - 1294
  • [48] A Mobile Malware Detection Method Based on Malicious Subgraphs Mining
    Du, Yao
    Cui, Mengtian
    Cheng, Xiaochun
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [49] Malware Provenance: Code Reuse Detection in Malicious Software at Scale
    Upchurch, Jason
    Zhou, Xiaobo
    2016 11TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2016, : 101 - 109
  • [50] AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph
    Wang, Runzheng
    Gao, Jian
    Huang, Shuhua
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1423 - 1443