Malicious Code Detection: Run Trace Output Analysis by LSTM

被引:7
|
作者
Acarturk, Cengiz [1 ]
Sirlanci, Melih [1 ]
Balikcioglu, Pinar Gurkan [1 ]
Demirci, Deniz [1 ]
Sahin, Nazenin [1 ]
Kucuk, Ozge Acar [1 ]
机构
[1] Middle East Tech Univ, Inst Informat, TR-06800 Ankara, Turkey
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Malware; Machine learning; Feature extraction; Static analysis; Semantics; Operating systems; Natural language processing; Dynamic analysis; LSTM; malware detection; natural language processing; run trace;
D O I
10.1109/ACCESS.2021.3049200
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious software threats and their detection have been gaining importance as a subdomain of information security due to the expansion of ICT applications in daily settings. A major challenge in designing and developing anti-malware systems is the coverage of the detection, particularly the development of dynamic analysis methods that can detect polymorphic and metamorphic malware efficiently. In the present study, we propose a methodological framework for detecting malicious code by analyzing run trace outputs by Long Short-Term Memory (LSTM). We developed models of run traces of malicious and benign Portable Executable (PE) files. We created our dataset from run trace outputs obtained from dynamic analysis of PE files. The obtained dataset was in the instruction format as a sequence and was called Instruction as a Sequence Model (ISM). By splitting the first dataset into basic blocks, we obtained the second one called Basic Block as a Sequence Model (BSM). The experiments showed that the ISM achieved an accuracy of 87.51% and a false positive rate of 18.34%, while BSM achieved an accuracy of 99.26% and a false positive rate of 2.62%.
引用
收藏
页码:9625 / 9635
页数:11
相关论文
共 50 条
  • [1] ANALYSIS OF RESNET MODEL FOR MALICIOUS CODE DETECTION
    Khan, Riaz Ullah
    Zhang, Xiaosong
    Kumar, Rajesh
    Tariq, Hussain Ahmad
    [J]. 2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 239 - 242
  • [2] MALICIOUS CODE DETECTION WITH INTEGRATED BEHAVIOR ANALYSIS
    Li, Xiao-Yong
    Liu, Wei-Wei
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2797 - 2801
  • [3] MCARTA: A Malicious Code Automated Run-Time Analysis Framework
    Nolan, Richard A.
    Chen, Peter P.
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 13 - 17
  • [4] MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising LSTM trainable parameters
    Zhang Y.
    Feng Y.
    Zhao Y.
    [J]. International Journal of Security and Networks, 2023, 18 (03) : 133 - 142
  • [5] Obfuscated malicious code detection with path condition analysis
    Fan, Wenqing
    Lei, Xue
    An, Jing
    [J]. Journal of Networks, 2014, 9 (05) : 1208 - 1214
  • [6] Detection Method of WEB Malicious Code based on Link Analysis
    Lu Zhiyong
    Sui Sai
    Huang Chengdong
    Wang Xueyu
    [J]. 2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 511 - 514
  • [7] Malicious Java']JavaScript Code Detection Based on Hybrid Analysis
    He, Xincheng
    Xu, Lei
    Cha, Chunliu
    [J]. 2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 365 - 374
  • [8] Malicious Code Detection Based on Code Semantic Features
    Zhang, Yu
    Li, Binglong
    [J]. IEEE ACCESS, 2020, 8 : 176728 - 176737
  • [9] Detection of malicious code in user mode
    Sangeetha, R.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 146 - 149
  • [10] Malicious code detection for open firmware
    Adelstein, F
    Stillerman, M
    Kozen, D
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 403 - 412