A malware detection method based on family behavior graph

被引:72
|
作者
Ding, Yuxin [1 ]
Xia, Xiaoling [1 ]
Chen, Sheng [1 ]
Li, Ye [1 ]
机构
[1] Shenzhen Univ Town, Shenzhen Grad Sch, Harbin Inst Technol, Shenzhen, Peoples R China
关键词
Dependency graph; Dynamic taint analysis; Malware; Security; System call;
D O I
10.1016/j.cose.2017.10.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Graph-based malware detection methods must build a behavior graph for each known malware, and they are difficult to apply in practice. To solve this issue, we study how to build a common behavior graph for each malware family. We represent malware behaviors as dependency graphs. To find the dependency relations between system calls, we use a dynamic taint analysis technique to mark the system call parameters with taint tags, and we then build the system call dependency graph by tracing the propagation of the taint data. Based on the dependency graphs of malware samples, we propose an algorithm to extract the common behavior graph, which is used to represent the behavioral features of a malware family. Finally, a graph matching algorithm that is based on the maximum weight sub graph is used to detect malicious code. The experimental results show that the proposed method has a high detection rate and a low false positive rate and can detect malware variants. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:73 / 86
页数:14
相关论文
共 50 条
  • [1] Effective malware detection scheme based on classified behavior graph in IIoT
    Sun, Yi
    Bashir, Ali Kashif
    Tariq, Usman
    Xiao, Fei
    [J]. AD HOC NETWORKS, 2021, 120
  • [2] Effective malware detection scheme based on classified behavior graph in IIoT
    Sun, Yi
    Bashir, Ali Kashif
    Tariq, Usman
    Xiao, Fei
    [J]. Ad Hoc Networks, 2021, 120
  • [3] Malware Detection based on Graph Classification
    Khanh-Huu-The Dam
    Touili, Tayssir
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 455 - 463
  • [4] Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection
    Wuchner, Tobias
    Cislak, Aleksander
    Ochoa, Martin
    Pretschner, Alexander
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 99 - 112
  • [5] Cryptocurrency Mining Malware Detection Based on Behavior Pattern and Graph Neural Network
    Zheng, Rui
    Wang, Qiuyun
    He, Jia
    Fu, Jianming
    Suri, Guga
    Jiang, Zhengwei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [6] MALDC: a depth detection method for malware based on behavior chains
    Zhang, Hao
    Zhang, Wenjun
    Lv, Zhihan
    Sangaiah, Arun Kumar
    Huang, Tao
    Chilamkurti, Naveen
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (02): : 991 - 1010
  • [7] MALDC: a depth detection method for malware based on behavior chains
    Hao Zhang
    Wenjun Zhang
    Zhihan Lv
    Arun Kumar Sangaiah
    Tao Huang
    Naveen Chilamkurti
    [J]. World Wide Web, 2020, 23 : 991 - 1010
  • [8] Graph-based Malware Distributors Detection
    Venzhega, Andrei
    Zhinalieva, Polina
    Suboch, Nikolay
    [J]. PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), 2013, : 1141 - 1144
  • [9] An Android Malware Detection Method Based on Metapath Aggregated Graph Neural Network
    Li, Qingru
    Zhang, Yufei
    Wang, Fangwei
    Wang, Changguang
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT III, 2024, 14489 : 344 - 357
  • [10] A Feature Representation Method of Social Graph for Malware Detection
    Jiang, Qingshan
    Liu, Nancheng
    Zhang, Wei
    [J]. 2013 FOURTH GLOBAL CONGRESS ON INTELLIGENT SYSTEMS (GCIS), 2013, : 139 - 143