Measuring Similarity of Malware Behavior

被引:19
|
作者
Apel, Martin [1 ]
Bockermann, Christian [1 ]
Meier, Michael [1 ]
机构
[1] Univ Dortmund, D-44221 Dortmund, Germany
关键词
SELF;
D O I
10.1109/LCN.2009.5355037
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious software (malware) represents a major threat for computer systems of almost all types. In the past few years the number of prevalent malware samples has increased dramatically due to the fact that malware authors started to deploy morphing (aka obfuscation) techniques in order to hinder detection of such polymorphic malware by anti-malware products. Using these techniques numerous variants of a malware can be generated. All these variants have a different syntactic representation while providing almost the same functionality and showing similar behavior. In order to effectively detect polymorphic malware it is advantageous (if not required) to know which malware samples are variants of a particular malware. Respective approaches for determining this relation between malware samples automatically are currently investigated by a number of researchers. A prerequisite for assessing this relation based on particular features of malware samples is an appropriate similarity or distance measure. In particular a number of approaches for clustering malware samples have been recently published. Thereby different similarity measures are used but without thoroughly discussing their choice. So it is an unanswered question which similarity measures are appropriate for determining respective relations between malware samples. To answer this question we study different distance measures in detail and discuss desirable properties of a distance measure for this particular purpose. We focus on behavioral features of malware and compare and experimentally evaluate different distance measures for malware behavior. Based on our results we identify a most appropriate distance measure for grouping malware samples based on similar behavior.
引用
收藏
页码:891 / 898
页数:8
相关论文
共 50 条
  • [1] Malware Obfuscation Measuring via Evolutionary Similarity
    Li, Jian
    Xu, Jun
    Xu, Ming
    Zhao, HengLi
    Zheng, Ning
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON FUTURE INFORMATION NETWORKS, 2009, : 197 - +
  • [2] Detecting and classifying method based on similarity matching of Android malware behavior with profile
    Jang, Jae-Wook
    Yun, Jaesung
    Mohaisen, Aziz
    Woo, Jiyoung
    Kim, Huy Kang
    [J]. SPRINGERPLUS, 2016, 5
  • [3] Variant: A Malware Similarity Testing Framework
    Upchurch, Jason
    Zhou, Xiaobo
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2015, : 31 - 39
  • [4] Structural Classification and Similarity Measurement of Malware
    Shi, Hongbo
    Hamagami, Tomoki
    Yoshioka, Katsunari
    Xu, Haoyuan
    Tobe, Kazuhiro
    Goto, Shigeki
    [J]. IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2014, 9 (06) : 621 - 632
  • [5] Evolved Similarity Techniques in Malware Analysis
    Black, Paul
    Gondal, Iqbal
    Vamplew, Peter
    Lakhotia, Arun
    [J]. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 404 - 409
  • [6] Detecting Malware with Similarity to Android applications
    Park, Wonjoo
    Kim, Sun-joong
    Ryu, Won
    [J]. 2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 1249 - 1251
  • [7] A Probabilistic Approach to Measuring Driving Behavior Similarity With Driving Primitives
    Wang, Wenshuo
    Han, Wei
    Na, Xiaoxiang
    Gong, Jianwei
    Xi, Junqiang
    [J]. IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2020, 5 (01): : 127 - 138
  • [8] Malware Behavior Image for Malware Variant Identification
    Shaid, Syed Zainudeen Mohd
    Maarof, Mohd Aizaini
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 238 - 243
  • [9] Malware Detection Method Based on Subgraph Similarity
    子图相似性的恶意程序检测方法
    [J]. Wang, Jie (jwang@csu.edu.cn), 1600, Chinese Academy of Sciences (31): : 3436 - 3447
  • [10] Dynamic Malware Detection using API Similarity
    Alkhateeb, Ehab M.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2017, : 297 - 301