MALDC: a depth detection method for malware based on behavior chains

被引:9
|
作者
Zhang, Hao [1 ,2 ]
Zhang, Wenjun [1 ,2 ]
Lv, Zhihan [3 ]
Sangaiah, Arun Kumar [4 ]
Huang, Tao [1 ,2 ]
Chilamkurti, Naveen [5 ]
机构
[1] Cent China Normal Univ, Natl Engn Lab Educ Big Data, Wuhan, Peoples R China
[2] Cent China Normal Univ, Natl Engn Res Ctr E Learning, Wuhan, Peoples R China
[3] Qingdao Univ, Sch Data Sci & Software Engn, Qingdao 266071, Peoples R China
[4] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[5] La Trobe Univ, Dept Comp Sci & Comp Engn, Melbourne, Vic, Australia
基金
中国国家自然科学基金;
关键词
Malicious behavior; API call sequence; Behavior chain; LSTM;
D O I
10.1007/s11280-019-00675-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious behavior detection is a key topic that has been a focus in the field of intrusion detection. Current intrusion detection systems are primarily based on single-point monitoring and detection and cannot detect attack modes with a hidden attack frequency. The idea presented in this paper is the incorporation of API call sequence software into the analysis and the construction of behavior chains to express the behavior patterns in software. This paper introduces related definitions of behavioral points and behaviors and proposes a depth-detection method for malware based on behavior chains (MALDC). The method monitors behavior points based on API calls and then uses the calling sequence of those behavior points at runtime to construct a behavior chain. Finally, we use depth detection method based on long short-term memory(LSTM) to detect malicious behavior from the behavior chains. To verify the performance of the proposed model, we conducted a large experiment on 54,324 malware and 53,361 benign samples collected from Windows systems and used those samples to train and test the model. Comparative verification by using various classifiers showed that the behavior points extracted based on the above method and the constructed behavior chains can be used to recognize malicious behavior at a high recognition rate. The method achieved an accuracy of 98.64% with a false positive rate of less than 2% in the best case, which is a satisfactory recognition rate for detecting malicious software behavior.
引用
收藏
页码:991 / 1010
页数:20
相关论文
共 50 条
  • [31] Android malware detection method based on bytecode image
    Yuxin Ding
    Xiao Zhang
    Jieke Hu
    Wenting Xu
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 6401 - 6410
  • [32] An Android Malware Detection Method Based on Deep AutoEncoder
    He, Nengqiang
    Wang, Tianqi
    Chen, Pingyang
    Yan, Hanbing
    Jin, Zhengping
    [J]. PROCEEDINGS OF 2018 ARTIFICIAL INTELLIGENCE AND CLOUD COMPUTING CONFERENCE (AICCC 2018), 2018, : 88 - 93
  • [33] Android malware detection method based on bytecode image
    Ding, Yuxin
    Zhang, Xiao
    Hu, Jieke
    Xu, Wenting
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 14 (5) : 6401 - 6410
  • [34] AN ANDROID MALWARE DETECTION METHOD BASED ON ANDROIDMANIFEST FILE
    Li, Xiang
    Liu, Jianyi
    Huo, Yanyu
    Zhang, Ru
    Yao, Yuangang
    [J]. PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 239 - 243
  • [35] Android malware detection based on static behavior feature analysis
    Chen, Chen
    Liu, Yun
    Shen, Bo
    Cheng, Jun-Jun
    [J]. Journal of Computers (Taiwan), 2018, 29 (06) : 243 - 253
  • [36] Design and implementation of a malware detection system based on network behavior
    Xue, L.
    Sun, G.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 459 - 470
  • [37] An effective behavior-based Android malware detection system
    Zou, Shihong
    Zhang, Jing
    Lin, Xiaodong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (12) : 2079 - 2089
  • [38] Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers
    Belaoued, Mohamed
    Guelib, Bouchra
    Bounaas, Yasmine
    Derhab, Abdelouahid
    Boufaida, Mahmoud
    [J]. MACHINE LEARNING FOR NETWORKING, 2019, 11407 : 166 - 180
  • [39] A novel and stable human detection and behavior recognition method based on depth sensor
    Yang, Shuqiang
    Li, Biao
    [J]. 3D RESEARCH, 2013, 4 (02): : 1 - 11
  • [40] Node Behavior based Fast Malware Detection for Enterprise Networks
    Chang, Su
    Daniels, Thomas E.
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,