DLLMiner: structural mining for malware detection

被引:30
|
作者
Narouei, Masoud [1 ]
Ahmadi, Mansour [2 ]
Giacinto, Giorgio [2 ]
Takabi, Hassan [1 ]
Sami, Ashkan [3 ,4 ]
机构
[1] Univ N Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
[2] Univ Cagliari, Dept Elect & Elect Engn, I-09124 Cagliari, Italy
[3] Shiraz Univ, Sch Elect & Comp Engn, CSE, Shiraz, Iran
[4] Shiraz Univ, Sch Elect & Comp Engn, IT Dept, Shiraz, Iran
关键词
malware analysis; dependency tree; closed frequent tree; evasion;
D O I
10.1002/sec.1255
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing anti-malware products usually use signature-based techniques as their main detection engine. Although these methods are very fast, they are unable to provide effective protection against newly discovered malware or mutated variant of old malware. Heuristic approaches are the next generation of detection techniques to mitigate the problem. These approaches aim to improve the detection rate by extracting more behavioral characteristics of malware. Although these approaches cover the disadvantages of signature-based techniques, they usually have a high false positive, and evasion is still possible from these approaches. In this paper, we propose an effective and efficient heuristic technique based on static analysis that not only detect malware with a very high accuracy, but also is robust against common evasion techniques such as junk injection and packing. Our proposed system is able to extract behavioral features from a unique structure in portable executable, which is called dynamic-link library dependency tree, without actually executing the application. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3311 / 3322
页数:12
相关论文
共 50 条
  • [21] Research on data mining of permissions mode for Android malware detection
    Wang, Chao
    Xu, Qingzhen
    Lin, Xiuli
    Liu, Shouqiang
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 13337 - 13350
  • [22] Frequent sub-graph mining for intelligent malware detection
    Eskandari, Mojtaba
    Raesi, Hooman
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1872 - 1886
  • [23] Malware Detection System Based on API Log Data Mining
    Fan, Chun-I
    Hsiao, Han-Wei
    Chou, Chun-Han
    Tseng, Yi-Fan
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 255 - 260
  • [24] Metamorphic Malware Detection using Control Flow Graph Mining
    Eskandari, Mojtaba
    Hashemi, Sattar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (12): : 1 - 6
  • [25] Maximal Frequent Sub-graph Mining for Malware Detection
    Hellal, Aya
    Ben Romdhane, Lotfi
    2015 15TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2015, : 31 - 39
  • [26] Data-Aware Declarative Process Mining for Malware Detection
    Ardimento, Pasquale
    Aversano, Lerina
    Bernardi, Mario Luca
    Cimitile, Marta
    2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,
  • [27] A Mobile Malware Detection Method Based on Malicious Subgraphs Mining
    Du, Yao
    Cui, Mengtian
    Cheng, Xiaochun
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [28] Mining Malware Secrets
    Lakhotia, Arun
    Black, Paul
    PROCEEDINGS OF THE 2017 12TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2017, : 11 - 18
  • [29] A Fuzzy-based Process Mining Approach for Dynamic Malware Detection
    Bernardi, Mario Luca
    Cimitile, Marta
    Martinelli, Fabio
    Mercaldo, Francesco
    2017 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2017,
  • [30] Malware Detection by Data Mining Techniques Based on Positionally Dependent Features
    Komashinskiy, Dmitriy
    Kotenko, Igor
    PROCEEDINGS OF THE 18TH EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, 2010, : 617 - 623