Subroutine based detection of APT malware

被引:14
|
作者
Sexton J. [1 ]
Storlie C. [1 ]
Anderson B. [1 ]
机构
[1] Los Alamos National Laboratory, Los Alamos, NM
关键词
APT; Malware detection; Static analysis; Subroutine similarity;
D O I
10.1007/s11416-015-0258-7
中图分类号
学科分类号
摘要
Statistical detection of mass malware has been shown to be highly successful. However, this type of malware is less interesting to cyber security officers of larger organizations, who are more concerned with detecting malware indicative of a targeted attack. Here we investigate the potential of statistically based approaches to detect such malware using a malware family associated with a large number of targeted network intrusions. Our approach is complementary to the bulk of statistical based malware classifiers, which are typically based on measures of overall similarity between executable files. One problem with this approach is that a malicious executable that shares some, but limited, functionality with known malware is likely to be misclassified as benign. Here a new approach to malware classification is introduced that classifies programs based on their similarity with known malware subroutines. It is illustrated that malware and benign programs can share a substantial amount of code, implying that classification should be based on malicious subroutines that occur infrequently, or not at all in benign programs. Various approaches to accomplishing this task are investigated, and a particularly simple approach appears the most effective. This approach simply computes the fraction of subroutines of a program that are similar to malware subroutines whose likes have not been found in a larger benign set. If this fraction exceeds around 1.5 %, the corresponding program can be classified as malicious at a 1 in 1000 false alarm rate. It is further shown that combining a local and overall similarity based approach can lead to considerably better prediction due to the relatively low correlation of their predictions. © 2015, Springer-Verlag France (Outside the USA).
引用
收藏
页码:225 / 233
页数:8
相关论文
共 50 条
  • [41] A PRACTICAL TAINT-BASED MALWARE DETECTION
    Zhang, Xiao-Song
    Zhi, Liu
    Chen, Da-Peng
    2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 73 - 77
  • [42] Permission based malware detection in android devices
    Ilham, Soussi
    Abderrahim, Ghadi
    Abdelhakim, Boudhir Anouar
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA'18), 2018,
  • [43] PDF Malware Detection based on Stacking Learning
    Issakhani, Maryam
    Victor, Princy
    Tekeoglu, Ali
    Lashkari, Arash Habibi
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 562 - 570
  • [44] Android malware detection based on sensitive patterns
    Liu, Kang
    Zhang, Guanghui
    Chen, Xue
    Liu, Qing
    Peng, Linyu
    Yurui, Liu
    TELECOMMUNICATION SYSTEMS, 2023, 82 (04) : 435 - 449
  • [45] CNN-based Android Malware Detection
    Ganesh, Meenu
    Pednekar, Priyanka
    Prabhuswamy, Pooja
    Nair, Divyashri Sreedharan
    Park, Younghee
    Jeon, Hyeran
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA), 2017, : 60 - 65
  • [46] A BEHAVIOR-BASED APPROACH FOR MALWARE DETECTION
    Mosli, Rayan
    Li, Rui
    Yuan, Bo
    Pan, Yin
    ADVANCES IN DIGITAL FORENSICS XIII, 2017, 511 : 187 - 201
  • [47] Malware Detection Method Based on Subgraph Similarity
    Wang J.
    Wang C.-Q.
    Wang, Jie (jwang@csu.edu.cn), 1600, Chinese Academy of Sciences (31): : 3436 - 3447
  • [48] Malware Detection in Android based on Dynamic Analysis
    Bhatia, Taniya
    Kaushal, Rishabh
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [49] IoT Malware Detection Based on OPCODE Purification
    Gulatas, Ibrahim
    Kilinc, Haci Hakan
    Aydin, Muhammed Ali
    Zaim, Abdul Halim
    ELECTRICA, 2023, 23 (03): : 634 - 642
  • [50] A Malware Detection Method Based on Hybrid Learning
    Liang G.-H.
    Bai L.
    Pang J.-M.
    Shan Z.
    Yue F.
    Zhang L.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2021, 49 (02): : 286 - 291