Security importance assessment for system objects and malware detection

被引:19
|
作者
Mao, Weixuan [1 ]
Cai, Zhongmin [1 ]
Towsley, Don [2 ]
Feng, Qian [3 ]
Guan, Xiaohong [1 ]
机构
[1] Xi An Jiao Tong Univ, Key Lab Intelligent Networks & Network Secur, Xian, Peoples R China
[2] Univ Massachusetts, Coll Informat & Comp Sci, Amherst, MA 01003 USA
[3] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY USA
关键词
Importance metric; Access behavior; Security dependency network; Malware detection; Behavioral-based detection; PROTECTION;
D O I
10.1016/j.cose.2017.02.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
System objects play different roles in computer systems and exhibit different levels of importance to system security. Assessing the importance of system objects helps us develop effective security protection methods. However, little work has focused on understanding and assessing the importance of system objects from a security perspective. In this paper, we build a security dependency network from access behaviors to quantify the security importance of system objects from a system-wide perspective. Similar to other networked systems, we observe small-world effect and power-law distributions for in and out-degree in the security dependency network. Exploring rich network structures in the security dependency network provides insights into the importance of system objects in security. We assess the importance of system objects, with respect to security, by the centrality metrics and propose an importance based model for malware detection. We evaluate importance metrics of system objects from various perspectives to demonstrate their feasibility and practicality. Furthermore, extensive experimental results on a real-world dataset demonstrate that our model is capable of detecting 7257 malware samples from 27,840 benign processes with a 93.92% true positive rate at 0.1% false positive rate. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:47 / 68
页数:22
相关论文
共 50 条
  • [1] Detection of Android Malware Security on System Calls
    Chen Da
    Zhang Hongmei
    Zhang Xiangli
    [J]. PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 974 - 978
  • [2] Industrial Control System Security-Malware Botnet Detection
    Sagala, Albert
    Pardosi, Rudy
    Lumbantobing, Alexander
    Siagian, Pandapotab
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS, AND ITS APPLICATIONS (IC3INA) - RECENT PROGRESS IN COMPUTER, CONTROL, AND INFORMATICS FOR DATA SCIENCE, 2016, : 125 - 130
  • [3] Detection and classification of passing objects for a security system
    Sanchez, R
    Umezaki, T
    Inoue, Y
    Hoguro, M
    Fujino, M
    [J]. Proceedings of the Fifth IASTED International Conference on Visualization, Imaging, and Image Processing, 2005, : 71 - 76
  • [4] Malware Detection for Healthcare Data Security
    Chowdhury, Mozammel
    Jahan, Sharmin
    Islam, Rafiqul
    Gao, Junbin
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT II, 2018, 255 : 407 - 416
  • [5] Feature importance in Android malware detection
    Kouliaridis, Vasileios
    Kambourakis, Georgios
    Peng, Tao
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1450 - 1455
  • [6] Improvements in Detection and Classification of Passing Objects for a Security System
    Sanchez-Saez, Ricardo
    Juan, Alfons
    Umezaki, Taizo
    Inoue, Yuki
    Hoguro, Masahiro
    Takefumi, Setta
    [J]. PATTERN RECOGNITION IN INFORMATION SYSTEMS, PROCEEDINGS, 2008, : 205 - +
  • [7] Measuring Malware Detection Capability for Security Decision Making
    Haq, Muhammad Yasir Muzayan
    Abhishta, Abhishta
    Zeijlemaker, Sander
    Chau, Annette
    Siegel, Michael
    Nieuwenhuis, L. J. M.
    [J]. 9TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW 2024, 2024, : 342 - 351
  • [8] Data Security and Malware Detection in Cloud Storage Services
    Cao, Ting
    Mao, Jianzhou
    Bhattacharya, Tathagata
    Peng, Xiaopu
    Ku, Wei-Shinn
    Qin, Xiao
    [J]. 2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 310 - 318
  • [9] Feature Importance and Deep Learning for Android Malware Detection
    Talbi, A.
    Viens, A.
    Leroux, L-C
    Francois, M.
    Caillol, M.
    Nguyen, N.
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 453 - 462
  • [10] MOBDroid: An Intelligent Malware Detection System for Improved Data Security in Mobile Cloud Computing Environments
    Ogwara, Noah Oghenefego
    Petrova, Krassie
    Yang, Mee Loong Bobby
    [J]. 2020 30TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2020, : 121 - 126