Malware Detection on Byte Streams of Hangul Word Processor Files

被引:2
|
作者
Jeong, Young-Seob [1 ]
Woo, Jiyoung [1 ]
Kang, Ah Reum [1 ]
机构
[1] Soonchunhyang Univ, SCH Media Labs, Asan 31538, South Korea
来源
APPLIED SCIENCES-BASEL | 2019年 / 9卷 / 23期
关键词
malware detection; HWP file; byte stream; convolutional neural network;
D O I
10.3390/app9235178
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
While the exchange of data files or programs on the Internet grows exponentially, most users are vulnerable to infected files, especially to malicious non-executables. Due to the circumstances between South and North Korea, many malicious actions have recently been found in Hangul Word Processor (HWP) non-executable files because the HWP is widely used in schools, military facilities, and government institutions of South Korea. The HWP file usually has one or more byte streams that are often used for the malicious actions. Based on an assumption that infected byte streams have particular patterns, we design a convolutional neural network (CNN) to grasp such patterns. We conduct experiments on our prepared 534 HWP files, and demonstrate that the proposed CNN achieves the best performance compared to other machine learning models. As new malicious attacks keep emerging, we will keep collecting such HWP files and investigate better model structures.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Malware Detection of Hangul Word Processor Files Using Spatial Pyramid Average Pooling
    Jeong, Young-Seob
    Woo, Jiyoung
    Lee, SangMin
    Kang, Ah Reum
    [J]. SENSORS, 2020, 20 (18) : 1 - 12
  • [2] Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks
    Jeong, Young-Seob
    Woo, Jiyoung
    Kang, Ah Reum
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [3] File-level malware detection using byte streams
    Young-Seob Jeong
    Medard Edmund Mswahili
    Ah Reum Kang
    [J]. Scientific Reports, 13
  • [4] IoT-Malware Detection Based on Byte Sequences of Executable Files
    Wan, Tzu-Ling
    Ban, Tao
    Lee, Yen-Ting
    Cheng, Shin-Ming
    Isawa, Ryoichi
    Takahashi, Takeshi
    Inoue, Daisuke
    [J]. 2020 15TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2020), 2020, : 143 - 150
  • [5] Malware Detection Using Byte Streams of Different File Formats
    Jeong, Young-Seob
    Lee, Sang-Min
    Kim, Jong-Hyun
    Woo, Jiyoung
    Kang, Ah Reum
    [J]. IEEE ACCESS, 2022, 10 : 51041 - 51047
  • [6] File-level malware detection using byte streams
    Jeong, Young-Seob
    Mswahili, Medard Edmund
    Kang, Ah Reum
    [J]. SCIENTIFIC REPORTS, 2023, 13 (01)
  • [7] Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files
    Wan, Tzu-Ling
    Ban, Tao
    Cheng, Shin-Ming
    Lee, Yen-Ting
    Sun, Bo
    Isawa, Ryoichi
    Takahashi, Takeshi
    Inoue, Daisuke
    [J]. IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2020, 1 (01): : 262 - 275
  • [8] Creating composite image files with a word processor
    Mamutil, J
    [J]. AMERICAN JOURNAL OF ORTHODONTICS AND DENTOFACIAL ORTHOPEDICS, 1997, 111 (01) : 107 - 109
  • [9] USING WORD PROCESSOR TEXT FILES AS AN ACTIVE BIBLIOGRAPHY
    SUNDERLAND, GT
    [J]. INTERNATIONAL JOURNAL OF CLINICAL MONITORING AND COMPUTING, 1988, 5 (01): : 35 - 36
  • [10] A Malware Variant Detection Method Based on Byte Randomness Test
    Qi, Shuhui
    Xu, Ming
    Zheng, Ning
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (10) : 2469 - 2477