Measuring Similarity of Malware Behavior

被引:19
|
作者
Apel, Martin [1 ]
Bockermann, Christian [1 ]
Meier, Michael [1 ]
机构
[1] Univ Dortmund, D-44221 Dortmund, Germany
关键词
SELF;
D O I
10.1109/LCN.2009.5355037
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious software (malware) represents a major threat for computer systems of almost all types. In the past few years the number of prevalent malware samples has increased dramatically due to the fact that malware authors started to deploy morphing (aka obfuscation) techniques in order to hinder detection of such polymorphic malware by anti-malware products. Using these techniques numerous variants of a malware can be generated. All these variants have a different syntactic representation while providing almost the same functionality and showing similar behavior. In order to effectively detect polymorphic malware it is advantageous (if not required) to know which malware samples are variants of a particular malware. Respective approaches for determining this relation between malware samples automatically are currently investigated by a number of researchers. A prerequisite for assessing this relation based on particular features of malware samples is an appropriate similarity or distance measure. In particular a number of approaches for clustering malware samples have been recently published. Thereby different similarity measures are used but without thoroughly discussing their choice. So it is an unanswered question which similarity measures are appropriate for determining respective relations between malware samples. To answer this question we study different distance measures in detail and discuss desirable properties of a distance measure for this particular purpose. We focus on behavioral features of malware and compare and experimentally evaluate different distance measures for malware behavior. Based on our results we identify a most appropriate distance measure for grouping malware samples based on similar behavior.
引用
收藏
页码:891 / 898
页数:8
相关论文
共 50 条
  • [21] Android malware detection via an app similarity graph
    Frenklach, Tatiana
    Cohen, Dvir
    Shabtai, Asaf
    Puzis, Rami
    [J]. COMPUTERS & SECURITY, 2021, 109
  • [22] Behavior Abstraction in Malware Analysis
    Beaucamps, Philippe
    Gnaedig, Isabelle
    Marion, Jean-Yves
    [J]. RUNTIME VERIFICATION, 2010, 6418 : 168 - 182
  • [23] Spectral Malware Behavior Clustering
    Giannella, Chris
    Bloedorn, Eric
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 7 - 12
  • [24] Graph Similarity Metric Using Graph Convolutional Network: Application to Malware Similarity Match
    Zhao, Bing-lin
    Liu, Fu-dong
    Shan, Zheng
    Chen, Yi-hang
    Liu, Jian
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (08) : 1581 - 1585
  • [25] An Analysis of Android Malware Behavior
    Singh, Gagandeep
    Jaafar, Fehmi
    Zavarsky, Pavol
    [J]. 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 505 - 512
  • [26] Learning and classification of malware behavior
    Rieck, Konrad
    Holz, Thorsten
    Willems, Carsten
    Duessel, Patrick
    Laskov, Pavel
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2008, 5137 : 108 - +
  • [27] DepSim: A Dependency-Based Malware Similarity Comparison System
    Yang Yi
    Ying Lingyun
    Wang Rui
    Su Purui
    Feng Dengguo
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 503 - 522
  • [28] Malware Visualization and Similarity via Tracking Binary Execution Path
    Kim, Jihun
    Lee, Sungwon
    Cho, Doosan
    Youn, Jonghee
    [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2022, 29 (01): : 221 - 230
  • [29] Malware Similarity Measurement Method Based on Multiplex Heterogeneous Graph
    Gu, Yong-Hao
    Wang, Yi-Fei
    Liu, Wei-Xin
    Wu, Tie-Jun
    Meng, Guo-Zhu
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (07): : 3188 - 3205
  • [30] ModDiff: Modularity Similarity-Based Malware Homologation Detection
    Sun, Huaqi
    Shu, Hui
    Kang, Fei
    Guang, Yan
    [J]. ELECTRONICS, 2023, 12 (10)