MALDC: a depth detection method for malware based on behavior chains

被引:9
|
作者
Zhang, Hao [1 ,2 ]
Zhang, Wenjun [1 ,2 ]
Lv, Zhihan [3 ]
Sangaiah, Arun Kumar [4 ]
Huang, Tao [1 ,2 ]
Chilamkurti, Naveen [5 ]
机构
[1] Cent China Normal Univ, Natl Engn Lab Educ Big Data, Wuhan, Peoples R China
[2] Cent China Normal Univ, Natl Engn Res Ctr E Learning, Wuhan, Peoples R China
[3] Qingdao Univ, Sch Data Sci & Software Engn, Qingdao 266071, Peoples R China
[4] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[5] La Trobe Univ, Dept Comp Sci & Comp Engn, Melbourne, Vic, Australia
基金
中国国家自然科学基金;
关键词
Malicious behavior; API call sequence; Behavior chain; LSTM;
D O I
10.1007/s11280-019-00675-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious behavior detection is a key topic that has been a focus in the field of intrusion detection. Current intrusion detection systems are primarily based on single-point monitoring and detection and cannot detect attack modes with a hidden attack frequency. The idea presented in this paper is the incorporation of API call sequence software into the analysis and the construction of behavior chains to express the behavior patterns in software. This paper introduces related definitions of behavioral points and behaviors and proposes a depth-detection method for malware based on behavior chains (MALDC). The method monitors behavior points based on API calls and then uses the calling sequence of those behavior points at runtime to construct a behavior chain. Finally, we use depth detection method based on long short-term memory(LSTM) to detect malicious behavior from the behavior chains. To verify the performance of the proposed model, we conducted a large experiment on 54,324 malware and 53,361 benign samples collected from Windows systems and used those samples to train and test the model. Comparative verification by using various classifiers showed that the behavior points extracted based on the above method and the constructed behavior chains can be used to recognize malicious behavior at a high recognition rate. The method achieved an accuracy of 98.64% with a false positive rate of less than 2% in the best case, which is a satisfactory recognition rate for detecting malicious software behavior.
引用
收藏
页码:991 / 1010
页数:20
相关论文
共 50 条
  • [1] MALDC: a depth detection method for malware based on behavior chains
    Hao Zhang
    Wenjun Zhang
    Zhihan Lv
    Arun Kumar Sangaiah
    Tao Huang
    Naveen Chilamkurti
    [J]. World Wide Web, 2020, 23 : 991 - 1010
  • [2] DroidChain: A novel Android malware detection method based on behavior chains
    Wang, Zhaoguo
    Li, Chenglong
    Yuan, Zhenlong
    Guan, Yi
    Xue, Yibo
    [J]. PERVASIVE AND MOBILE COMPUTING, 2016, 32 : 3 - 14
  • [3] A malware detection method based on family behavior graph
    Ding, Yuxin
    Xia, Xiaoling
    Chen, Sheng
    Li, Ye
    [J]. COMPUTERS & SECURITY, 2018, 73 : 73 - 86
  • [4] DroidChain: A Novel Malware Detection Method for Android based on Behavior Chain
    Wang, Zhaoguo
    Li, Chenglong
    Guan, Yi
    Xue, Yibo
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 727 - 728
  • [5] Malware Detection Method Based on Visualization
    Xie, Nannan
    Liang, Haoxiang
    Mu, Linyang
    Zhang, Chuanxue
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT VI, 2024, 14492 : 252 - 264
  • [6] An Android Behavior-Based Malware Detection Method using Machine Learning
    Chang, Wei-Ling
    Sun, Hung-Min
    Wu, Wei
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2016,
  • [7] A BEHAVIOR-BASED APPROACH FOR MALWARE DETECTION
    Mosli, Rayan
    Li, Rui
    Yuan, Bo
    Pan, Yin
    [J]. ADVANCES IN DIGITAL FORENSICS XIII, 2017, 511 : 187 - 201
  • [8] Lightweight Behavior-Based Malware Detection
    Anisetti, Marco
    Ardagna, Claudio A.
    Bena, Nicola
    Giandomenico, Vincenzo
    Gianini, Gabriele
    [J]. MANAGEMENT OF DIGITAL ECOSYSTEMS, MEDES 2023, 2024, 2022 : 237 - 250
  • [9] Behavior-based malware analysis and detection
    Liu, Wu
    Ren, Ping
    Liu, Ke
    Duan, Hai-Xin
    [J]. Proceedings - 2011 1st International Workshop on Complexity and Data Mining, IWCDM 2011, 2011, : 39 - 42
  • [10] Malware Detection Based on Suspicious Behavior Identification
    Wang, Cheng
    Pang, Jianmin
    Zhao, Rongcai
    Fu, Wen
    Liu, Xiaoxian
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 198 - 202