Security importance assessment for system objects and malware detection

被引:19
|
作者
Mao, Weixuan [1 ]
Cai, Zhongmin [1 ]
Towsley, Don [2 ]
Feng, Qian [3 ]
Guan, Xiaohong [1 ]
机构
[1] Xi An Jiao Tong Univ, Key Lab Intelligent Networks & Network Secur, Xian, Peoples R China
[2] Univ Massachusetts, Coll Informat & Comp Sci, Amherst, MA 01003 USA
[3] Syracuse Univ, Dept Elect Engn & Comp Sci, Syracuse, NY USA
关键词
Importance metric; Access behavior; Security dependency network; Malware detection; Behavioral-based detection; PROTECTION;
D O I
10.1016/j.cose.2017.02.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
System objects play different roles in computer systems and exhibit different levels of importance to system security. Assessing the importance of system objects helps us develop effective security protection methods. However, little work has focused on understanding and assessing the importance of system objects from a security perspective. In this paper, we build a security dependency network from access behaviors to quantify the security importance of system objects from a system-wide perspective. Similar to other networked systems, we observe small-world effect and power-law distributions for in and out-degree in the security dependency network. Exploring rich network structures in the security dependency network provides insights into the importance of system objects in security. We assess the importance of system objects, with respect to security, by the centrality metrics and propose an importance based model for malware detection. We evaluate importance metrics of system objects from various perspectives to demonstrate their feasibility and practicality. Furthermore, extensive experimental results on a real-world dataset demonstrate that our model is capable of detecting 7257 malware samples from 27,840 benign processes with a 93.92% true positive rate at 0.1% false positive rate. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:47 / 68
页数:22
相关论文
共 50 条
  • [21] New directions for security attacks, privacy, and malware detection in WBAN
    Mukesh Soni
    Dileep Kumar Singh
    [J]. Evolutionary Intelligence, 2023, 16 : 1917 - 1934
  • [22] Application of CLIPS Expert System to Malware Detection System
    Zhou Ruili
    Pan Jianfeng
    Tan Xiaobin
    Xi Hongsheng
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 309 - 314
  • [23] Malware System Calls Detection Using Hybrid System
    Guan, Yue
    Ezzati-Jivan, Naser
    [J]. 2021 15TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2021), 2021,
  • [24] Integrated IT system for security of large objects
    Cupriak, Malgorzata
    Jasinski, Slawomir
    Kaliczynska, Malgorzata
    [J]. 2014 ELEKTRO, 2014, : 36 - 40
  • [25] A Malware Detection System Inspired on the Human Immune System
    de Oliveira, Isabela Liane
    Abed Gregio, Andre Ricardo
    Cansian, Adriano Mauro
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2012, PT IV, 2012, 7336 : 286 - 301
  • [26] Risk Assessment of Power System Security Based on Component Importance and Operation State
    Liu, Pei-Qing
    Li, Hua-Qiang
    Du, Yang
    Zeng, Ke
    [J]. 2014 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2014,
  • [27] A Malware Detection System Based on Intermediate Language
    Zhao, Binglin
    Han, Jin
    Meng, Xi
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2017, : 824 - 830
  • [28] A Holistic Intelligent Cryptojacking Malware Detection System
    Almurshid, Hadeel A.
    Almomani, Iman
    Khalifa, M.A.
    El-Shafai, Walid
    [J]. IEEE Access, 2024, 12 : 161417 - 161439
  • [29] A detection method and system implementation for Android malware
    Hu, Wenjun
    Zhao, Shuang
    Tao, Jing
    Ma, Xiaobo
    Chen, Liang
    [J]. Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2013, 47 (10): : 37 - 43
  • [30] Permission based detection system for android malware
    Utku, Anil
    Dogru, Ibrahim Alper
    [J]. JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2017, 32 (04): : 1015 - 1024