Frequent sub-graph mining for intelligent malware detection

被引:12
|
作者
Eskandari, Mojtaba [1 ]
Raesi, Hooman [2 ]
机构
[1] Shiraz Univ, Dept Comp Sci & Engn, Shiraz, Fars, Iran
[2] Islamic Azad Univ, Arak Branch, Dept Comp Engn, Arak, Iran
关键词
malware; intelligent detection; semantic signature; programming style; frequent sub-graph; CFG; ARCHITECTURE;
D O I
10.1002/sec.902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware is a serious threat that has caused catastrophic disasters in recent decades. To deal with this issue, various approaches have been proposed. One effective and widely used method is signature-based detection. However, there is a substantial problem in detecting new instances; therefore, this method is solely useful for second malware attacks. In addition, owing to the rapid proliferation of malware and the significant human effort requirement to extract signatures, this approach is an inadequate solution; thus, an intelligent malware detection system is required. One of the major phases of such a system is feature extraction, used to construct a learning model. This paper introduces an approach to generate a group of semantic signatures, represented by a set of learning models, in which various features indicate the different programming styles of the execution files. A set of these signatures is obtained by mining frequent sub-graphs, common code sub-structures employed for malware writing, in a group of control flow graphs. The experimental results depict an improved F-measure rate in comparison with the classic graph-based approach. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1872 / 1886
页数:15
相关论文
共 50 条
  • [31] A Method to Identify Graphs Containing a Specific Sub-graph
    Hikita, Tomoya
    Kimura, Masaomi
    NEW TRENDS IN DISRUPTIVE TECHNOLOGIES, TECH ETHICS AND ARTIFICIAL INTELLIGENCE, DITTET 2022, 2023, 1430 : 43 - 54
  • [32] Exploiting Sub-Graph Isomorphism and Probabilistic Neural Networks for the Detection of Hardware Trojans at RTL
    Demrozi, Florenc
    Zucchelli, Riccardo
    Pravadelli, Graziano
    2017 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP (HLDVT), 2017, : 67 - 73
  • [33] Malware Detection Based on Graph Attention Networks for Intelligent Transportation Systems
    Catal, Cagatay
    Gunduz, Hakan
    Ozcan, Alper
    ELECTRONICS, 2021, 10 (20)
  • [34] Vector Representation for Sub-Graph Encoding to Resolve Entities
    Guo, Jinhong K.
    Van Brackle, David
    Lofaso, Nicolas
    Hofmann, Martin O.
    COMPLEX ADAPTIVE SYSTEMS, 2016, 95 : 327 - 334
  • [35] Sub-Graph BasedJoint Sparse Graph for Sparse Code Multiple Access Systems
    Lai, Ke
    Wen, Lei
    Lei, Jing
    Xiao, Pei
    Maaref, Amine
    Imran, Muhammad Ali
    IEEE ACCESS, 2018, 6 : 25066 - 25080
  • [36] An intelligent PE-malware detection system based on association mining
    Ye, Yanfang
    Wang, Dingding
    Li, Tao
    Ye, Dongyi
    Jiang, Qingshan
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (04): : 323 - 334
  • [37] Algorithm for detecting complete sub-graph in complex network
    Dept. of Electronic Machinery and Transportation Engineering, Guilin University of Electronic Technology, Guilin 541004, China
    不详
    Yi Qi Yi Biao Xue Bao, 2006, SUPPL. (925-927):
  • [38] Top-K Correlation Sub-graph Search in Graph Databases
    Zou, Lei
    Chen, Lei
    Lu, Yansheng
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PROCEEDINGS, 2009, 5463 : 168 - +
  • [39] Even-aged restrictions with sub-graph adjacency
    Barrett, TM
    Gilless, JK
    ANNALS OF OPERATIONS RESEARCH, 2000, 95 (1-4) : 159 - 175
  • [40] Scalable image segmentation via decoupled sub-graph compression
    Medeiros, R. S.
    Wong, A.
    Scharcanski, J.
    PATTERN RECOGNITION, 2018, 78 : 228 - 241