DLLMiner: structural mining for malware detection

被引:30
|
作者
Narouei, Masoud [1 ]
Ahmadi, Mansour [2 ]
Giacinto, Giorgio [2 ]
Takabi, Hassan [1 ]
Sami, Ashkan [3 ,4 ]
机构
[1] Univ N Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
[2] Univ Cagliari, Dept Elect & Elect Engn, I-09124 Cagliari, Italy
[3] Shiraz Univ, Sch Elect & Comp Engn, CSE, Shiraz, Iran
[4] Shiraz Univ, Sch Elect & Comp Engn, IT Dept, Shiraz, Iran
关键词
malware analysis; dependency tree; closed frequent tree; evasion;
D O I
10.1002/sec.1255
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing anti-malware products usually use signature-based techniques as their main detection engine. Although these methods are very fast, they are unable to provide effective protection against newly discovered malware or mutated variant of old malware. Heuristic approaches are the next generation of detection techniques to mitigate the problem. These approaches aim to improve the detection rate by extracting more behavioral characteristics of malware. Although these approaches cover the disadvantages of signature-based techniques, they usually have a high false positive, and evasion is still possible from these approaches. In this paper, we propose an effective and efficient heuristic technique based on static analysis that not only detect malware with a very high accuracy, but also is robust against common evasion techniques such as junk injection and packing. Our proposed system is able to extract behavioral features from a unique structure in portable executable, which is called dynamic-link library dependency tree, without actually executing the application. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3311 / 3322
页数:12
相关论文
共 50 条
  • [1] Malware Detection by Text and Data Mining
    Sundarkumar, G. Ganesh
    Ravi, Vadlamani
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 566 - 571
  • [2] Semantic Malware Detection by Deploying Graph Mining
    Karbalaie, Fatemeh
    Sami, Ashkan
    Ahmadi, Mansour
    International Journal of Computer Science Issues, 2012, 9 (1 1-3): : 373 - 379
  • [3] Mining Mobile Internet Packets for Malware Detection
    Jin, Haifeng
    Cui, Baojiang
    Wang, Jianxin
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 481 - 486
  • [4] Mining and Detection of Anaroia Malware Based on Permissions
    Sahal, Abdirashid Ahmed
    Alam, Shahid
    Sogukpinar, Ibrahim
    2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 264 - 268
  • [5] Mining API Calls and Permissions for Android Malware Detection
    Sharma, Akanksha
    Dash, Subrat Kumar
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 191 - 205
  • [6] A Malware Detection Scheme Based on Mining Format Information
    Bai, Jinrong
    Wang, Junfeng
    Zou, Guozhong
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [7] Minimal contrast frequent pattern mining for malware detection
    Hellal, Aya
    Ben Romdhane, Lotfi
    COMPUTERS & SECURITY, 2016, 62 : 19 - 32
  • [8] Design and Implementation of a Data Mining System for Malware Detection
    Thuraisingham, Bhavani
    Al-Khatib, Tahseen
    Khan, Latifur
    Masud, Mehedy
    Hamlen, Kevin
    Khadilkar, Vaibhav
    Abrol, Satyen
    JOURNAL OF INTEGRATED DESIGN & PROCESS SCIENCE, 2012, 16 (02) : 33 - 49
  • [9] Integrated Usage of Data Mining Methods for Malware Detection
    Komashinskiy, Dmitriy
    Kotenko, Igor
    INFORMATION FUSION AND GEOGRAPHIC INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 343 - 357
  • [10] A Survey on Malware Detection Using Data Mining Techniques
    Ye, Yanfang
    Li, Tao
    Adjeroh, Donald
    Iyengar, S. Sitharama
    ACM COMPUTING SURVEYS, 2017, 50 (03)