Subroutine based detection of APT malware

被引:14
|
作者
Sexton J. [1 ]
Storlie C. [1 ]
Anderson B. [1 ]
机构
[1] Los Alamos National Laboratory, Los Alamos, NM
关键词
APT; Malware detection; Static analysis; Subroutine similarity;
D O I
10.1007/s11416-015-0258-7
中图分类号
学科分类号
摘要
Statistical detection of mass malware has been shown to be highly successful. However, this type of malware is less interesting to cyber security officers of larger organizations, who are more concerned with detecting malware indicative of a targeted attack. Here we investigate the potential of statistically based approaches to detect such malware using a malware family associated with a large number of targeted network intrusions. Our approach is complementary to the bulk of statistical based malware classifiers, which are typically based on measures of overall similarity between executable files. One problem with this approach is that a malicious executable that shares some, but limited, functionality with known malware is likely to be misclassified as benign. Here a new approach to malware classification is introduced that classifies programs based on their similarity with known malware subroutines. It is illustrated that malware and benign programs can share a substantial amount of code, implying that classification should be based on malicious subroutines that occur infrequently, or not at all in benign programs. Various approaches to accomplishing this task are investigated, and a particularly simple approach appears the most effective. This approach simply computes the fraction of subroutines of a program that are similar to malware subroutines whose likes have not been found in a larger benign set. If this fraction exceeds around 1.5 %, the corresponding program can be classified as malicious at a 1 in 1000 false alarm rate. It is further shown that combining a local and overall similarity based approach can lead to considerably better prediction due to the relatively low correlation of their predictions. © 2015, Springer-Verlag France (Outside the USA).
引用
收藏
页码:225 / 233
页数:8
相关论文
共 50 条
  • [31] APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework
    Han, Weijie
    Xue, Jingfeng
    Wang, Yong
    Zhang, Fuquan
    Gao, Xianwei
    INFORMATION SCIENCES, 2021, 546 : 633 - 664
  • [32] Malware detection based on semi-supervised learning with malware visualization
    Gao, Tan
    Zhao, Lan
    Li, Xudong
    Chen, Wen
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2021, 18 (05) : 5995 - 6011
  • [33] Toward Identifying APT Malware through API System Calls
    Wei, Chaoxian
    Li, Qiang
    Guo, Dong
    Meng, Xiangyu
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [34] The APT Detection Method based on Attack Tree for SDN
    Jia Shan-Shan
    Xu Ya-Bin
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 116 - 121
  • [35] Community detection in complex network based on APT method
    Chen, Qingfeng
    Qiao, YuLu
    Hu, Fang
    Li, Yongjie
    Tan, Kai
    Zhu, Mingrui
    Zhang, Chengqi
    PATTERN RECOGNITION LETTERS, 2020, 138 : 193 - 200
  • [36] An APT Attack Detection Method Based on eBPF and Transformer
    Qiu, Rixuan
    Luo, Hao
    Jing, Sitong
    Li, Xinxiu
    Li, Yuancheng
    International Journal of Network Security, 2024, 26 (06) : 964 - 972
  • [37] An APT Event Extraction Method Based on BERT-BiGRU-CRF for APT Attack Detection
    Xiang, Ga
    Shi, Chen
    Zhang, Yangsen
    ELECTRONICS, 2023, 12 (15)
  • [38] Malware variants detection based on ensemble learning
    Ma Yan
    Du Donggao
    The Journal of China Universities of Posts and Telecommunications, 2020, 27 (02) : 82 - 90
  • [39] Permission based detection system for android malware
    Utku, Anil
    Dogru, Ibrahim Alper
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2017, 32 (04): : 1015 - 1024
  • [40] A Malware Detection System Based on Intermediate Language
    Zhao, Binglin
    Han, Jin
    Meng, Xi
    2017 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2017, : 824 - 830