AMAL: High-fidelity, behavior-based automated malware analysis and classification

被引:128
|
作者
Mohaisen, Aziz [1 ]
Alrawi, Omar [2 ]
Mohaisen, Manar [3 ]
机构
[1] Verisign Labs, Bozeman, MT USA
[2] Qatar Fdn, QCRI, Doha, Qatar
[3] Korea Tech, Cheonan, South Korea
关键词
Malware; Classification; Automatic analysis; Clustering; Machine learning; Dynamic analysis;
D O I
10.1016/j.cose.2015.04.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces AMAL, an automated and behavior-based malware analysis and labeling system that addresses shortcomings of the existing systems. AMAL consists of two sub-systems, AutoMal and MaLabel. AutoMal provides tools to collect low granularity behavioral artifacts that characterize malware usage of the file system, memory, network, and registry, and does that by running malware samples in virtualized environments. On the other hand, MaLabel uses those artifacts to create representative features, use them for building classifiers trained by manually vetted training samples, and use those classifiers to classify malware samples into families similar in behavior. AutoMal also enables unsupervised learning, by implementing multiple clustering algorithms for samples grouping. An evaluation of both AutoMal and MaLabel based on medium-scale (4000 samples) and large-scale datasets (more than 115,000 samples) collected and analyzed by AutoMal over 13 months shows AMAL's effectiveness in accurately characterizing, classifying, and grouping malware samples. MaLabel achieves a precision of 99.5% and recall of 99.6% for certain families' classification, and more than 98% of precision and recall for unsupervised clustering. Several benchmarks, cost estimates and measurements highlight the merits of AMAL. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:251 / 266
页数:16
相关论文
共 50 条
  • [1] AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification
    Mohaisen, Aziz
    Alrawi, Omar
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2014, 2015, 8909 : 107 - 121
  • [2] Holography: a behavior-based profiler for malware analysis
    Dai, Shih-Yao
    Fyodor, Yarochkin
    Wu, Ming-Wei
    Huang, Yennun
    Kuo, Sy-Yen
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2012, 42 (09): : 1107 - 1136
  • [3] A Framework for Behavior-Based Malware Analysis in the Cloud
    Martignoni, Lorenzo
    Paleari, Roberto
    Bruschi, Danilo
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 178 - +
  • [4] Automated Malware Classification based on Network Behavior
    Nari, Saeed
    Ghorbani, Ali A.
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
  • [5] Impeding behavior-based malware analysis via replacement attacks to malware specifications
    Ming J.
    Xin Z.
    Lan P.
    Wu D.
    Liu P.
    Mao B.
    [J]. Journal of Computer Virology and Hacking Techniques, 2017, 13 (3) : 193 - 207
  • [6] Lightweight Behavior-Based Malware Detection
    Anisetti, Marco
    Ardagna, Claudio A.
    Bena, Nicola
    Giandomenico, Vincenzo
    Gianini, Gabriele
    [J]. MANAGEMENT OF DIGITAL ECOSYSTEMS, MEDES 2023, 2024, 2022 : 237 - 250
  • [7] A BEHAVIOR-BASED APPROACH FOR MALWARE DETECTION
    Mosli, Rayan
    Li, Rui
    Yuan, Bo
    Pan, Yin
    [J]. ADVANCES IN DIGITAL FORENSICS XIII, 2017, 511 : 187 - 201
  • [8] Three-phase behavior-based detection and classification of known and unknown malware
    Lin, Ying-Dar
    Lai, Yuan-Cheng
    Lu, Chun-Nan
    Hsu, Peng-Kai
    Lee, Chia-Yin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (11) : 2004 - 2015
  • [9] Behavior-based features model for malware detection
    Galal H.S.
    Mahdy Y.B.
    Atiea M.A.
    [J]. Journal of Computer Virology and Hacking Techniques, 2016, 12 (2) : 59 - 67
  • [10] Behavior-Based Malware Detection on Mobile Phone
    Dai, Shuaifu
    Liu, Yaxin
    Wang, Tielei
    Wei, Tao
    Zou, Wei
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,