A Malware Detection Scheme Based on Mining Format Information

被引:34
|
作者
Bai, Jinrong [1 ,2 ]
Wang, Junfeng [1 ]
Zou, Guozhong [2 ]
机构
[1] Sichuan Univ, Coll Comp Sci, Chengdu 610065, Peoples R China
[2] Yuxi Normal Univ, Sch Informat Technol & Engn, Yuxi 653100, Peoples R China
来源
关键词
ARTIFICIAL NEURAL-NETWORKS; MALICIOUS EXECUTABLES;
D O I
10.1155/2014/260905
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Malware has become one of the most serious threats to computer information system and the current malware detection technology still has very significant limitations. In this paper, we proposed a malware detection approach by mining format information of PE (portable executable) files. Based on in-depth analysis of the static format information of the PE files, we extracted 197 features from format information of PE files and applied feature selection methods to reduce the dimensionality of the features and achieve acceptable high performance. When the selected features were trained using classification algorithms, the results of our experiments indicate that the accuracy of the top classification algorithmis 99.1% and the value of the AUC is 0.998. We designed three experiments to evaluate the performance of our detection scheme and the ability of detecting unknown and new malware. Although the experimental results of identifying new malware are not perfect, our method is still able to identify 97.6% of new malware with 1.3% false positive rates.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Mining and Detection of Anaroia Malware Based on Permissions
    Sahal, Abdirashid Ahmed
    Alam, Shahid
    Sogukpinar, Ibrahim
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 264 - 268
  • [2] DMDAM: Data Mining Based Detection of Android Malware
    Bhattacharya, Abhishek
    Goswami, Radha Tamal
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 187 - 194
  • [3] An unknown malware detection scheme based on the features of graph
    Zhao, Zongqu
    Wang, Junfeng
    Wang, Chonggang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 239 - 246
  • [4] Malytics: A Malware Detection Scheme
    Yousefi-Azar, Mahmood
    Hamey, Leonard G. C.
    Varadharajan, Vijay
    Chen, Sniping
    [J]. IEEE ACCESS, 2018, 6 : 49418 - 49431
  • [5] MALWARE DETECTION BASED ON OBJECTIVE-ORIENTED ASSOCIATION MINING
    Xiao Xiao
    Ding Yuxin
    Zhang Yibin
    Tang Ke
    Dai Wei
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOLS 1-4, 2013, : 375 - 380
  • [6] Malware Detection System Based on API Log Data Mining
    Fan, Chun-I
    Hsiao, Han-Wei
    Chou, Chun-Han
    Tseng, Yi-Fan
    [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 255 - 260
  • [7] A Mobile Malware Detection Method Based on Malicious Subgraphs Mining
    Du, Yao
    Cui, Mengtian
    Cheng, Xiaochun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] A NEW MALWARE DETECTION METHOD BASED ON RAW INFORMATION
    Han, Qiao-Ling
    Hao, Yu-Jie
    Zhang, Yan
    Lu, Zhi-Peng
    Zhang, Rui
    [J]. 2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 307 - +
  • [9] A Malware Detection System Based on Heterogeneous Information Network
    Yin, Shang-Nan
    Kang, Ho-Seok
    Chen, Zhi-Guo
    Kim, Sung-Ryul
    [J]. PROCEEDINGS OF THE 2018 CONFERENCE ON RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS (RACS 2018), 2018, : 154 - 159
  • [10] NOA: AN INFORMATION RETRIEVAL BASED MALWARE DETECTION SYSTEM
    Santos, Igor
    Ugarte-Pedrero, Xabier
    Brezo, Felix
    Bringas, Pablo G.
    Maria Gomez-Hidalgo, Jose
    [J]. COMPUTING AND INFORMATICS, 2013, 32 (01) : 145 - 174