Graph-Based Malware Detection Using Opcode Sequences

被引:11
|
作者
Gulmez, Sibel [1 ]
Sogukpinar, Ibrahim [1 ]
机构
[1] Gebze Tech Univ, Comp Engn, Kocaeli, Turkey
关键词
malware detection; static analysis; opcode analysis; graph-based detection; packed malware;
D O I
10.1109/ISDFS52919.2021.9486386
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The impact of malware grows for IT (information technology) systems day by day. The number, the complexity, and the cost of them increase rapidly. While researchers are developing new and better detection algorithms, attackers are also evolving malware to fail the current detection techniques. Therefore malware detection becomes one of the most challenging tasks in cyber security. To increase the performance of the detection techniques, researchers benefit from different approaches. But some of them might cost a lot both in time and hardware resources. This situation puts forward fast and cheap detection methods. In this context, static analysis provides these utilities but it is important to keep detection accuracy high while reducing resource consumption. Opcodes (operational codes) are commonly used in static analysis but sometimes feature extraction from opcodes might be difficult since an opcode sequence might have a great length. Furthermore, most of the malware developers use obfuscation and encryption techniques to avoid detection methods based on static analysis. This kind of malware is called packed malware and according to common belief, packed malware should be either unpacked or analyzed dynamically in order to detect them. In this study, a graph-based malware detection method has been proposed to overcome these problems. The proposed method relies on obtaining the opcode graph of every executable file in the dataset and using them for future extraction. In this way, the proposed method reaches up to 98% detection accuracy. In addition to the accuracy rate, the proposed method makes it possible to detect packed malware without the need for unpacking or dynamic analysis.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] GMAD: Graph-based Malware Activity Detection by DNS traffic analysis
    Lee, Jehyun
    Lee, Heejo
    COMPUTER COMMUNICATIONS, 2014, 49 : 33 - 47
  • [32] Encrypted Malware Traffic Detection via Graph-based Network Analysis
    Fu, Zhuoqun
    Liu, Mingxuan
    Qin, Yue
    Zhang, Jia
    Zou, Yuan
    Yin, Qilei
    Li, Qi
    Duan, Haixin
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 495 - 509
  • [33] Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
    Abusnaina, Ahmed
    Khormali, Aminollah
    Alasmary, Hisham
    Park, Jeman
    Anwar, Afsah
    Mohaisen, Aziz
    2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, : 1296 - 1305
  • [34] IRMD: Malware variant Detection using opcode Image Recognition
    Zhang, Jixin
    Qin, Zheng
    Yin, Hui
    Ou, Lu
    Hu, Yupeng
    2016 IEEE 22ND INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2016, : 1175 - 1180
  • [35] Learning to detect Android malware via opcode sequences
    Pektas, Abdurrahman
    Acarman, Tankut
    NEUROCOMPUTING, 2020, 396 : 599 - 608
  • [36] Analysis and Comparison of Opcode-based Malware Detection Approaches
    Nar, Mert
    Kakisim, Arzu Gorgulu
    Carkaci, Necmettin
    Yavuz, Melek Nurten
    Sogukpinar, Ibrahim
    2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 498 - 503
  • [37] Sequential opcode embedding-based malware detection method
    Kakisim, Arzu Gorgulu
    Gulmez, Sibel
    Sogukpinar, Ibrahim
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
  • [38] Application of Deep Belief Networks for Opcode Based Malware Detection
    Ding, Yuxin
    Chen, Sheng
    Xu, Jun
    2016 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2016, : 3901 - 3908
  • [39] MobileNet-Based IoT Malware Detection with Opcode Features
    Mai C.
    Liao R.
    Ren J.
    Gong Y.
    Zhang K.
    Zhang C.
    Journal of Communications and Information Networks, 2023, 8 (03) : 221 - 230
  • [40] MalHAPGNN: An Enhanced Call Graph-Based Malware Detection Framework Using Hierarchical Attention Pooling Graph Neural Network
    Guo, Wenjie
    Du, Wenbiao
    Yang, Xiuqi
    Xue, Jingfeng
    Wang, Yong
    Han, Weijie
    Hu, Jingjing
    SENSORS, 2025, 25 (02)