Run-time malware detection based on positive selection

被引:11
|
作者
Fuyong Z. [1 ]
Deyu Q. [1 ]
机构
[1] Research Institute of Computer Systems, South China University of Technology
来源
Journal in Computer Virology | 2011年 / 7卷 / 4期
基金
中国国家自然科学基金;
关键词
Selection Algorithm; Intrusion Detection; Clonal Selection; Kernel Mode; Unknown Data;
D O I
10.1007/s11416-011-0154-8
中图分类号
学科分类号
摘要
This paper presents a supervised methodology that detects malware based on positive selection. Malware detection is a challenging problem due to the rapid growth of the number of malware and increasing complexity. Run-time monitoring of program execution behavior is widely used to discriminate between benign and malicious executables due to its effectiveness and robustness. This paper proposes a novel classification algorithm based on the idea of positive selection, which is one of the important algorithms in Artificial Immune Systems (AIS), inspired by positive selection of T-cells. The proposed algorithm is applied to learn and classify program behavior based on I/O Request Packets (IRP). In our experiments, the proposed algorithm outperforms ANSC, Naï ve Bayes, Bayesian Networks, Support Vector Machine, and C4. 5 Decision Tree. This algorithm can also be used in general purpose classification problems not just two-class but multi-class problems. © 2011 Springer-Verlag France.
引用
收藏
页码:267 / 277
页数:10
相关论文
共 50 条
  • [1] Run-time malware detection based on IRP
    Zhang F.-Y.
    Qi D.-Y.
    Hu J.-L.
    [J]. Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2011, 39 (02): : 113 - 117
  • [2] Evaluation of run-time detection of self-replication in binary executable malware
    Volynkin, Alexander
    Skormin, Victor A.
    Summerville, Douglas H.
    Moronski, James
    [J]. 2006 IEEE Information Assurance Workshop, 2006, : 184 - 191
  • [3] Ensemble Learning for Effective Run-Time Hardware-Based Malware Detection: A Comprehensive Analysis and Classification
    Sayadi, Hossein
    Patel, Nisarg
    Manoj, Sai P. D.
    Sasan, Avesta
    Rafatirad, Setareh
    Homayoun, Houman
    [J]. 2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [4] Run-time selection of the checkpoint interval in Time Warp based simulations
    Univ of Roma `La Sapienza', Rome, Italy
    [J]. Simul Pract Theory, 5 (461-478):
  • [5] Model-based run-time error detection
    Hooman, Jozef
    Hendriks, Teun
    [J]. MODELS IN SOFTWARE ENGINEERING, 2008, 5002 : 225 - 236
  • [6] Run-time selection of the checkpoint interval in Time Warp based simulations
    Auriche, Laurent R.G.
    Quaglia, Francesco
    Ciciani, Bruno
    [J]. Simulation Practice and Theory, 1998, 6 (05): : 461 - 478
  • [7] Run-time detection of heap-based overflows
    Robertson, W
    Kruegel, C
    Mutz, D
    Valeur, F
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE SEVENTEENTH LARGE INSTALLATION SYSTEMS ADMINISTRATION CONFERENCE, 2003, : 51 - 59
  • [8] MalAware: Effective and Efficient Run-time Mobile Malware Detector
    Milosevic, Jelena
    Ferrante, Alberto
    Malek, Miroslaw
    [J]. 2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 270 - 277
  • [9] Run-time detection of covert channels
    Nagatou, Naoyuki
    Watanabe, Takuo
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 577 - +
  • [10] The Importance of Run-Time Error Detection
    Luecke, Glenn R.
    Coyle, James
    Hoekstra, James
    Kraeva, Marina
    Xu, Ying
    Park, Mi-Young
    Kleiman, Elizabeth
    Weiss, Olga
    Wehe, Andre
    Yahya, Melissa
    [J]. TOOLS FOR HIGH PERFORMANCE COMPUTING 2009, 2010, : 145 - 155