A graph mining approach for detecting unknown malwares

被引:46
|
作者
Eskandari, Mojtaba [1 ]
Hashemi, Sattar [1 ]
机构
[1] Shiraz Univ, Dept Comp Sci & Engn, Shiraz, Iran
来源
关键词
Malware; Detection; Unknown malwares; PE-file; CFG; API; SYSTEM;
D O I
10.1016/j.jvlc.2012.02.002
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays malware is one of the serious problems in the modern societies. Although the signature based malicious code detection is the standard technique in all commercial antivirus softwares, it can only achieve detection once the virus has already caused damage and it is registered. Therefore, it fails to detect new malwares (unknown malwares). Since most of malwares have similar behavior, a behavior based method can detect unknown malwares. The behavior of a program can be represented by a set of called API's (application programming interface). Therefore, a classifier can be employed to construct a learning model with a set of programs' API calls. Finally, an intelligent malware detection system is developed to detect unknown malwares automatically. On the other hand, we have an appealing representation model to visualize the executable files structure which is control flow graph (CFG). This model represents another semantic aspect of programs. This paper presents a robust semantic based method to detect unknown malwares based on combination of a visualize model (CFG) and called API's. The main contribution of this paper is extracting CFG from programs and combining it with extracted API calls to have more information about executable files. This new representation model is called API-CFG. In addition, to have fast learning and classification process, the control flow graphs are converted to a set of feature vectors by a nice trick. Our approach is capable of classifying unseen benign and malicious code with high accuracy. The results show a statistically significant improvement over n-grams based detection method. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:154 / 162
页数:9
相关论文
共 50 条
  • [1] Detecting Android Malwares By Mining Statically Registered Broadcast Receivers
    Mohsen, Fadi
    Bisgin, Halil
    Scott, Zachary
    Strait, Kyle
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 67 - 76
  • [2] Demalvertising: A Kernel Approach for Detecting Malwares in Advertising Networks
    Poornachandran, Prabaharan
    Balagopal, N.
    Pal, Soumajit
    Ashok, Aravind
    Sankar, Prem
    Krishnan, Manu R.
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 215 - 224
  • [3] Deep Learning for Detecting Android Malwares
    Ilham, Soussi
    Abderrahim, Ghadi
    Anouar Abdelhakim, Boudhir
    [J]. 4TH INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA' 19), 2019,
  • [4] Detecting Malware Based on DNS Graph Mining
    Zou, Futai
    Zhang, Siyu
    Rao, Weixiong
    Yi, Ping
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [5] The unknown knowns: a graph-based approach for temporal COVID-19 literature mining
    Bayram, Ulya
    Roy, Runia
    Assalil, Aqil
    BenHiba, Lamia
    [J]. ONLINE INFORMATION REVIEW, 2021, 45 (04) : 687 - 708
  • [6] A Hybridized Graph Mining Approach
    Priyadarshini, Sadhana
    Mishra, Debahuti
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 356 - 361
  • [7] Detecting Design Patterns in Object-Oriented Design Models by Using a Graph Mining Approach
    Oruc, Murat
    Akal, Fuat
    Sever, Hayri
    [J]. 2016 FOURTH INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING RESEARCH AND INNOVATION - CONISOFT 2016, 2016, : 115 - 121
  • [8] A graph mining approach for detecting identical design structures in object-oriented design models
    Tekin, Umut
    Buzluca, Feza
    [J]. SCIENCE OF COMPUTER PROGRAMMING, 2014, 95 : 406 - 425
  • [9] A Survey on Data Mining approaches for Dynamic Analysis of Malwares
    Shah, Kshitij
    Singh, Dushyant Kumar
    [J]. 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 495 - 499
  • [10] An approach to Mining Information from Telephone Graph Using Graph Mining Techniques
    Rao, Bapuji
    Mishra, S. N.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 424 - 429