Kernel Machines for Malware Classification and Similarity Analysis

被引:0
|
作者
Shankarapani, M.
Kancherla, K.
Ramammoorthy, S.
Movva, R.
Mukkamala, S.
机构
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we present a method of functionally classifying malicious code that might lead to automated attacks and intrusions using kernel machines. We study the performance of kernel methods in the context of robustness and generalization capabilities of malware classification. Current static detection and scanning techniques for malicious code and malware have serious limitations; on the other hand, sandbox testing fails to provide a complete satisfactory solution either due to time constraints (e. g., time bombs cannot be detected before its preset time expires). Results show that malware analysis based on the Windows API calling sequence that reflects the behavior of a particular piece of code gives good accuracy to classify malware. We also show that classification accuracy varies with the kernel type and the parameter values; thus, with appropriately chosen parameter values, intrusions can be detected by SVMs with higher accuracy and lower rates of false alarms.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Structural Classification and Similarity Measurement of Malware
    Shi, Hongbo
    Hamagami, Tomoki
    Yoshioka, Katsunari
    Xu, Haoyuan
    Tobe, Kazuhiro
    Goto, Shigeki
    [J]. IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2014, 9 (06) : 621 - 632
  • [2] Classification of Malware Using Visualisation of Similarity Matrices
    Venkatraman, Sitalakshmi
    Alazab, Mamoun
    [J]. 2017 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2017, : 3 - 8
  • [3] Humans vs. Machines in Malware Classification
    Aonzo, Simone
    Han, Yufei
    Mantovani, Alessandro
    Balzarotti, Davide
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 1145 - 1162
  • [4] A Malware Classification Method based on Similarity of Function Structure
    Zhong, Yang
    Yamaki, Hirofumi
    Takakura, Hiroki
    [J]. 2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, : 256 - 261
  • [5] Computational Intelligent Techniques and Similarity Measures for Malware Classification
    Shankarpani, M. K.
    Kancherla, K.
    Movva, R.
    Mukkamala, S.
    [J]. COMPUTATIONAL INTELLIGENCE FOR PRIVACY AND SECURITY, 2012, 394 : 215 - 236
  • [6] A kernel functions analysis for support vector machines for land cover classification
    Kavzoglu, T.
    Colkesen, I.
    [J]. INTERNATIONAL JOURNAL OF APPLIED EARTH OBSERVATION AND GEOINFORMATION, 2009, 11 (05): : 352 - 359
  • [7] Evolved Similarity Techniques in Malware Analysis
    Black, Paul
    Gondal, Iqbal
    Vamplew, Peter
    Lakhotia, Arun
    [J]. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 404 - 409
  • [8] Enhancing Malware Classification via Self-Similarity Techniques
    Zhong, Fangtian
    Hu, Qin
    Jiang, Yili
    Huang, Jiaqi
    Zhang, Cheng
    Wu, Dinghao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7232 - 7244
  • [9] Convolutional neural networks and extreme learning machines for malware classification
    Mugdha Jain
    William Andreopoulos
    Mark Stamp
    [J]. Journal of Computer Virology and Hacking Techniques, 2020, 16 : 229 - 244
  • [10] Convolutional neural networks and extreme learning machines for malware classification
    Jain, Mugdha
    Andreopoulos, William
    Stamp, Mark
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (03) : 229 - 244