Malytics: A Malware Detection Scheme

被引:23
|
作者
Yousefi-Azar, Mahmood [1 ,2 ]
Hamey, Leonard G. C. [1 ]
Varadharajan, Vijay [3 ]
Chen, Sniping [2 ]
机构
[1] Macquarie Univ, Fac Sci & Engn, Dept Comp, Sydney, NSW 2109, Australia
[2] Commonwealth Sci & Ind Res Org, Data61, Marsfield, NSW 2122, Australia
[3] Univ Newcastle, Fac Engn & Built Environm, Callaghan, NSW 2308, Australia
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Malware detection; static analysis; binary level n-grams; term frequency shimhashing; extreme learning machine; EXTREME LEARNING MACHINES;
D O I
10.1109/ACCESS.2018.2864871
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An important problem of cyber-security is malware analysis. Besides good precision and recognition rate, ideally, a malware detection scheme needs to be able to generalize well for novel malware families (a.k.a zero-day attacks). It is important that the system does not require excessive computation particularly for deployment on the mobile devices. In this paper, we propose a novel scheme to detect malware which we call Malytics. It is not dependent on any particular tool or operating system. It extracts static features of any given binary file to distinguish malware from benign. Malytics consists of three stages: feature extraction, similarity measurement, and classification. The three phases are implemented by a neural network with two hidden layers and an output layer. We show feature extraction, which is performed by tf-simhashing, is equivalent to the first layer of a particular neural network. We evaluate Malytics performance on both Android and Windows platforms. Malytics outperforms a wide range of learning-based techniques and also individual state-of-the-art models on both platforms. We also show Malytics is resilient and robust in addressing zero-day malware samples. The F1-score of Malytics is 97.21% and 99.45% on Android dex file and Windows PE files, respectively, in the applied datasets. The speed and efficiency of Malytics are also evaluated.
引用
收藏
页码:49418 / 49431
页数:14
相关论文
共 50 条
  • [1] A Malware Detection Scheme Based on Mining Format Information
    Bai, Jinrong
    Wang, Junfeng
    Zou, Guozhong
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [2] An unknown malware detection scheme based on the features of graph
    Zhao, Zongqu
    Wang, Junfeng
    Wang, Chonggang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 239 - 246
  • [3] RoughDroid: Operative Scheme for Functional Android Malware Detection
    Riad, Khaled
    Ke, Lishan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [4] Feature Engineering and Evaluation for Android Malware Detection Scheme
    Jung, Jaemin
    Park, Jihyeon
    Cho, Seong-je
    Han, Sangchul
    Park, Minkyu
    Cho, Hsin-Hung
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (02): : 423 - 440
  • [5] Permission-Combination-based Scheme for Android Mobile Malware Detection
    Liang, Shuang
    Du, Xiaojiang
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 2301 - 2306
  • [6] Effective malware detection scheme based on classified behavior graph in IIoT
    Sun, Yi
    Bashir, Ali Kashif
    Tariq, Usman
    Xiao, Fei
    [J]. AD HOC NETWORKS, 2021, 120
  • [7] Android Malware Detection Scheme Based on Level of SSL Server Certificate
    Kato, Hiroya
    Haruta, Shuichiro
    Sasase, Iwao
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (02) : 379 - 389
  • [8] Android Malware Detection Scheme Based on Level of SSL Server Certificate
    Kato, Hiroya
    Haruta, Shuichiro
    Sasase, Iwao
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [9] A Malware Detection Scheme via Smart Memory Forensics for Windows Devices
    Naeem, Muhammad Rashid
    Khan, Mansoor
    Abdullah, Ako Muhammad
    Noor, Fazal
    Khan, Muhammad Ijaz
    Khan, Muhammad Asghar
    Ullah, Insaf
    Room, Shah
    [J]. MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [10] Sustainable Android Malware Detection Scheme using Deep Learning Algorithm
    Alzubaidi, Abdulaziz
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (12) : 860 - 867