Malware Detection Based on Suspicious Behavior Identification

被引:12
|
作者
Wang, Cheng [1 ]
Pang, Jianmin [1 ]
Zhao, Rongcai [1 ]
Fu, Wen [1 ]
Liu, Xiaoxian [1 ]
机构
[1] China Natl Digital Switching Syst Engn & Technol, Zhengzhou 450002, Henan, Peoples R China
关键词
D O I
10.1109/ETCS.2009.306
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Along with the popularization of computers, especially the wide use of Internet, malicious code in recent years has presented a serious threat to our world. In this paper, through the analysis against the suspicious behaviors of vicious program by function calls, we present an approach of malware detection which is based on analysis and distilling of representative characteristic and systemic description of the suspicious behaviors indicated by the sequences of APIs called under Windows. Based on function calls and control flow analysis, according to the identification of suspicious behavior, the technique implements a strategy of detection from malicious binary executables.
引用
收藏
页码:198 / 202
页数:5
相关论文
共 50 条
  • [1] Suspicious behavior detection based on DECOC classifier
    Ben Ayed, Mossaad
    Abid, Mohamed
    [J]. 2017 18TH INTERNATIONAL CONFERENCE ON SCIENCES AND TECHNIQUES OF AUTOMATIC CONTROL AND COMPUTER ENGINEERING (STA), 2017, : 594 - 598
  • [2] A BEHAVIOR-BASED APPROACH FOR MALWARE DETECTION
    Mosli, Rayan
    Li, Rui
    Yuan, Bo
    Pan, Yin
    [J]. ADVANCES IN DIGITAL FORENSICS XIII, 2017, 511 : 187 - 201
  • [3] Lightweight Behavior-Based Malware Detection
    Anisetti, Marco
    Ardagna, Claudio A.
    Bena, Nicola
    Giandomenico, Vincenzo
    Gianini, Gabriele
    [J]. MANAGEMENT OF DIGITAL ECOSYSTEMS, MEDES 2023, 2024, 2022 : 237 - 250
  • [4] Behavior-based malware analysis and detection
    Liu, Wu
    Ren, Ping
    Liu, Ke
    Duan, Hai-Xin
    [J]. Proceedings - 2011 1st International Workshop on Complexity and Data Mining, IWCDM 2011, 2011, : 39 - 42
  • [5] Malware Behavior Image for Malware Variant Identification
    Shaid, Syed Zainudeen Mohd
    Maarof, Mohd Aizaini
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 238 - 243
  • [6] Fuzzy Logic Based UAV Suspicious Behavior Detection
    Sun Rui
    Zhang Yucheng
    Hu Minghua
    [J]. Transactions of Nanjing University of Aeronautics and Astronautics, 2016, 33 (06) : 721 - 725
  • [7] A malware detection method based on family behavior graph
    Ding, Yuxin
    Xia, Xiaoling
    Chen, Sheng
    Li, Ye
    [J]. COMPUTERS & SECURITY, 2018, 73 : 73 - 86
  • [8] Behavior-based features model for malware detection
    Galal H.S.
    Mahdy Y.B.
    Atiea M.A.
    [J]. Journal of Computer Virology and Hacking Techniques, 2016, 12 (2) : 59 - 67
  • [9] Malware Detection Based on Deep Learning of Behavior Graphs
    Xiao, Fei
    Lin, Zhaowen
    Sun, Yi
    Ma, Yan
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2019, 2019
  • [10] A Study on The behavior-based Malware Detection Signature
    Oh, Sungtaek
    Go, Woong
    Lee, Taejin
    [J]. ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 663 - 670