Measuring Similarity of Malware Behavior

被引:19
|
作者
Apel, Martin [1 ]
Bockermann, Christian [1 ]
Meier, Michael [1 ]
机构
[1] Univ Dortmund, D-44221 Dortmund, Germany
关键词
SELF;
D O I
10.1109/LCN.2009.5355037
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious software (malware) represents a major threat for computer systems of almost all types. In the past few years the number of prevalent malware samples has increased dramatically due to the fact that malware authors started to deploy morphing (aka obfuscation) techniques in order to hinder detection of such polymorphic malware by anti-malware products. Using these techniques numerous variants of a malware can be generated. All these variants have a different syntactic representation while providing almost the same functionality and showing similar behavior. In order to effectively detect polymorphic malware it is advantageous (if not required) to know which malware samples are variants of a particular malware. Respective approaches for determining this relation between malware samples automatically are currently investigated by a number of researchers. A prerequisite for assessing this relation based on particular features of malware samples is an appropriate similarity or distance measure. In particular a number of approaches for clustering malware samples have been recently published. Thereby different similarity measures are used but without thoroughly discussing their choice. So it is an unanswered question which similarity measures are appropriate for determining respective relations between malware samples. To answer this question we study different distance measures in detail and discuss desirable properties of a distance measure for this particular purpose. We focus on behavioral features of malware and compare and experimentally evaluate different distance measures for malware behavior. Based on our results we identify a most appropriate distance measure for grouping malware samples based on similar behavior.
引用
收藏
页码:891 / 898
页数:8
相关论文
共 50 条
  • [41] Measuring the Similarity of Geometric Graphs
    Cheong, Otfried
    Gudmundsson, Joachim
    Kim, Hyo-Sil
    Schymura, Daria
    Stehn, Fabian
    [J]. EXPERIMENTAL ALGORITHMS, PROCEEDINGS, 2009, 5526 : 101 - +
  • [42] Measuring the similarity of labeled graphs
    Champin, PA
    Solnon, C
    [J]. CASE-BASED REASONING RESEARCH AND DEVELOPMENT, PROCEEDINGS, 2003, 2689 : 80 - 95
  • [43] On metrics for measuring scanpath similarity
    Fahimi, Ramin
    Bruce, Neil D. B.
    [J]. BEHAVIOR RESEARCH METHODS, 2021, 53 (02) : 609 - 628
  • [44] On measuring similarity for sequences of itemsets
    Elias Egho
    Chedy Raïssi
    Toon Calders
    Nicolas Jay
    Amedeo Napoli
    [J]. Data Mining and Knowledge Discovery, 2015, 29 : 732 - 764
  • [45] On measuring similarity for conceptual querying
    Bulskov, H
    Knappe, R
    Andreasen, T
    [J]. FLEXIBLE QUERY ANSWERING SYSTEMS, PROCEEDINGS, 2002, 2522 : 100 - 111
  • [46] Measuring Similarity for Security Vulnerabilities
    Wang, Ju An
    Zhou, Linfeng
    Guo, Minzhe
    Wang, Hao
    Camargo, Jairo
    [J]. 43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 962 - 971
  • [47] Measuring similarity in belief revision
    Peppas, P
    Foo, N
    Nayak, A
    [J]. JOURNAL OF LOGIC AND COMPUTATION, 2000, 10 (04) : 603 - 619
  • [48] Measuring Structural Similarity in Music
    Bello, Juan P.
    [J]. IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2011, 19 (07): : 2013 - 2025
  • [49] Behavior Grouping of Android Malware Family
    Hsiao, Shun-Wen
    Sun, Yeali S.
    Chen, Meng Chang
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [50] Measuring Malware Detection Capability for Security Decision Making
    Haq, Muhammad Yasir Muzayan
    Abhishta, Abhishta
    Zeijlemaker, Sander
    Chau, Annette
    Siegel, Michael
    Nieuwenhuis, L. J. M.
    [J]. 9TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW 2024, 2024, : 342 - 351