Effective Malware Detection Based on Behaviour and Data Features

被引:2
|
作者
Xu, Zhiwu [1 ]
Wen, Cheng [1 ]
Qin, Shengchao [1 ]
Ming, Zhong [1 ]
机构
[1] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
CODE;
D O I
10.1007/978-3-319-73830-7_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malware is one of the most serious security threats on the Internet today. Traditional detection methods become ineffective as malware continues to evolve. Recently, various machine learning approaches have been proposed for detecting malware. However, either they focused on behaviour information, leaving the data information out of consideration, or they did not consider too much about the new malware with different behaviours or new malware versions obtained by obfuscation techniques. In this paper, we propose an effective approach for malware detection using machine learning. Different from most existing work, we take into account not only the behaviour information but also the data information, namely, the opcodes, data types and system libraries used in executables. We employ various machine learning methods in our implementation. Several experiments are conducted to evaluate our approach. The results show that (1) the classifier trained by Random Forest performs best with the accuracy 0.9788 and the AUC 0.9959; (2) all the features (including data types) are effective for malware detection; (3) our classifier is capable of detecting some fresh malware; (4) our classifier has a resistance to some obfuscation techniques.
引用
收藏
页码:53 / 66
页数:14
相关论文
共 50 条
  • [21] Signature based Malware Detection for Unstructured Data in Hadoop
    Sahoo, Abhaya Kumar
    Sahoo, Kshira Sagar
    Tiwary, Mayank
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC), 2014,
  • [22] A Comparison of Features for Android Malware Detection
    Leeds, Matthew
    Keffeler, Miclain
    Atkison, Travis
    [J]. PROCEEDINGS OF THE SOUTHEAST CONFERENCE ACM SE'17, 2017, : 63 - 68
  • [23] AUTOMATIC BEHAVIOUR-BASED ANALYSIS AND CLASSIFICATION SYSTEM FOR MALWARE DETECTION
    Devesa, Jaime
    Santos, Igor
    Cantero, Xabier
    Penya, Yoseba K.
    Bringas, Pablo G.
    [J]. ICEIS 2010: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL 2: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2010, : 395 - 399
  • [24] Discriminant Features for Metamorphic Malware Detection
    Kuriakose, Jikku
    Vinod, P.
    [J]. 2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 406 - 411
  • [25] Effective malware detection scheme based on classified behavior graph in IIoT
    Sun, Yi
    Bashir, Ali Kashif
    Tariq, Usman
    Xiao, Fei
    [J]. AD HOC NETWORKS, 2021, 120
  • [26] LGMal: A Joint Framework Based on Local and Global Features for Malware Detection
    Chai, Yuhan
    Qiu, Jing
    Su, Shen
    Zhu, Chunsheng
    Yin, Lihua
    Tian, Zhihong
    [J]. 2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 463 - 468
  • [27] WHGDroid: Effective android malware detection based on weighted heterogeneous graph
    Huang, Lu
    Xue, Jingfeng
    Wang, Yong
    Liu, Zhenyan
    Chen, Junbao
    Kong, Zixiao
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 77
  • [28] A New Approach for Effective Malware Detection in Android-based Devices
    Deypir, Mahmood
    [J]. 2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2016, : 112 - 116
  • [29] Online Analytical And Detection Model Of Familial Malware Based On Communication Features
    Wang, Yiyang
    Chen, Shaoming
    Liang, Bin
    Song, Yuan
    Xiao, Xinguang
    Kang, Xuebin
    [J]. 2016 9TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI 2016), 2016, : 1990 - 1994
  • [30] Windows malware detection system based on LSVC recommended hybrid features
    Darshan, S. L. Shiva
    Jaidhar, C. D.
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2019, 15 (02) : 127 - 146