Malware Detection by Data Mining Techniques Based on Positionally Dependent Features

被引:15
|
作者
Komashinskiy, Dmitriy [1 ]
Kotenko, Igor [1 ]
机构
[1] St Petersburg Inst Informat & Automat, Comp Secur Res Grp, St Petersburg, Russia
关键词
classification; positionally dependent features; feature selection; malware; static and dynamic detection;
D O I
10.1109/PDP.2010.30
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The challenges being thrown to modern world by the need to counteract against malicious software (malware) are going on to increase own importance. This fact stays actual, in spite of obvious great results in improving the efficacy of procedures of malware propagation detection, analysis and updating the bases of signatures and detection rules. The important aspect of this problem is looking for more reliable heuristic detection methods. These methods focus on recognition of new (unknown before) malicious programs which can not be detected by using traditional signature-and rule-based detection techniques, oriented on search for concrete malware samples and families. Virtually, just these heuristic methods provide counteraction against targeted and zero-day attacks, since the rate of detecting such relatively new types of threats by traditional techniques is not enough. The presented paper is devoted to using Data Mining methods for constructing heuristic malware detectors. The approach described below differs from others by focusing on processing static positionally dependent features which consider the specificities of object's file format of potential malware containers. The paper describes the realization and investigation of the common methodology for design of Data Mining-based malware detectors' using positionally dependent static information.
引用
收藏
页码:617 / 623
页数:7
相关论文
共 50 条
  • [1] A Survey on Malware Detection Using Data Mining Techniques
    Ye, Yanfang
    Li, Tao
    Adjeroh, Donald
    Iyengar, S. Sitharama
    [J]. ACM COMPUTING SURVEYS, 2017, 50 (03)
  • [2] DMDAM: Data Mining Based Detection of Android Malware
    Bhattacharya, Abhishek
    Goswami, Radha Tamal
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 187 - 194
  • [3] HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection
    Eskandari, Mojtaba
    Khorshidpour, Zeinab
    Hashemi, Sattar
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (02): : 77 - 93
  • [4] Effective Malware Detection Based on Behaviour and Data Features
    Xu, Zhiwu
    Wen, Cheng
    Qin, Shengchao
    Ming, Zhong
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2017, 2018, 10699 : 53 - 66
  • [5] Malware Detection by Text and Data Mining
    Sundarkumar, G. Ganesh
    Ravi, Vadlamani
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 566 - 571
  • [6] Malware Detection System Based on API Log Data Mining
    Fan, Chun-I
    Hsiao, Han-Wei
    Chou, Chun-Han
    Tseng, Yi-Fan
    [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 255 - 260
  • [7] Comparative Analysis of Different Feature Ranking Techniques in Data Mining-Based Android Malware Detection
    Bhattacharya, Abhishek
    Goswami, Radha Tamal
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 39 - 49
  • [8] A state-of-the-art survey of malware detection approaches using data mining techniques
    Souri, Alireza
    Hosseini, Rahil
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2018, 8
  • [9] Android malware detection based on image-based features and machine learning techniques
    Unver, Halil Murat
    Bakour, Khaled
    [J]. SN APPLIED SCIENCES, 2020, 2 (07)
  • [10] Android malware detection based on image-based features and machine learning techniques
    Halil Murat Ünver
    Khaled Bakour
    [J]. SN Applied Sciences, 2020, 2