Graph-Based Malware Detection Using Opcode Sequences

被引:11
|
作者
Gulmez, Sibel [1 ]
Sogukpinar, Ibrahim [1 ]
机构
[1] Gebze Tech Univ, Comp Engn, Kocaeli, Turkey
关键词
malware detection; static analysis; opcode analysis; graph-based detection; packed malware;
D O I
10.1109/ISDFS52919.2021.9486386
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The impact of malware grows for IT (information technology) systems day by day. The number, the complexity, and the cost of them increase rapidly. While researchers are developing new and better detection algorithms, attackers are also evolving malware to fail the current detection techniques. Therefore malware detection becomes one of the most challenging tasks in cyber security. To increase the performance of the detection techniques, researchers benefit from different approaches. But some of them might cost a lot both in time and hardware resources. This situation puts forward fast and cheap detection methods. In this context, static analysis provides these utilities but it is important to keep detection accuracy high while reducing resource consumption. Opcodes (operational codes) are commonly used in static analysis but sometimes feature extraction from opcodes might be difficult since an opcode sequence might have a great length. Furthermore, most of the malware developers use obfuscation and encryption techniques to avoid detection methods based on static analysis. This kind of malware is called packed malware and according to common belief, packed malware should be either unpacked or analyzed dynamically in order to detect them. In this study, a graph-based malware detection method has been proposed to overcome these problems. The proposed method relies on obtaining the opcode graph of every executable file in the dataset and using them for future extraction. In this way, the proposed method reaches up to 98% detection accuracy. In addition to the accuracy rate, the proposed method makes it possible to detect packed malware without the need for unpacking or dynamic analysis.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Using opcode sequences in single-class learning to detect unknown malware
    Santos, I.
    Brezo, F.
    Sanz, B.
    Laorden, C.
    Bringas, P. G.
    IET INFORMATION SECURITY, 2011, 5 (04) : 220 - 227
  • [42] Opcode-level function call graph based android malware classification using deep learning
    Niu, Weina
    Cao, Rong
    Zhang, Xiaosong
    Ding, Kangyi
    Zhang, Kaimeng
    Li, Ting
    Sensors (Switzerland), 2020, 20 (13): : 1 - 23
  • [43] OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
    Niu, Weina
    Cao, Rong
    Zhang, Xiaosong
    Ding, Kangyi
    Zhang, Kaimeng
    Li, Ting
    SENSORS, 2020, 20 (13) : 1 - 23
  • [44] Z2F: Heterogeneous graph-based Android malware detection
    Ma, Ziwei
    Luktarhan, Nurbor
    PLOS ONE, 2024, 19 (03):
  • [45] DeepCatra: Learning flow- and graph-based behaviours for Android malware detection
    Wu, Yafei
    Shi, Jian
    Wang, Peicheng
    Zeng, Dongrui
    Sun, Cong
    IET INFORMATION SECURITY, 2023, 17 (01) : 118 - 130
  • [46] Heterogeneous Opcode Space for Metamorphic Malware Detection
    Raphel, Jithu
    Vinod, P.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) : 537 - 558
  • [47] Heterogeneous Opcode Space for Metamorphic Malware Detection
    Jithu Raphel
    P. Vinod
    Arabian Journal for Science and Engineering, 2017, 42 : 537 - 558
  • [48] Meta Opcode Space for Morphed Malware Detection
    Azhikoden, Athira
    Vinod, P.
    2015 11TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2015, : 284 - 289
  • [49] An opcode-based technique for polymorphic Internet of Things malware detection
    Darabian, Hamid
    Dehghantanha, Ali
    Hashemi, Sattar
    Homayoun, Sajad
    Choo, Kim-Kwang Raymond
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (06):
  • [50] Control flow-based opcode behavior analysis for Malware detection
    Ding, Yuxin
    Dai, Wei
    Yan, Shengli
    Zhang, Yumei
    COMPUTERS & SECURITY, 2014, 44 : 65 - 74