...
首页> 外文期刊>Journal of Computer Virology and Hacking Techniques >Abstracting minimal security-relevant behaviors for malware analysis
【24h】

Abstracting minimal security-relevant behaviors for malware analysis

机译:抽象最小化与安全性相关的行为以进行恶意软件分析

获取原文
获取原文并翻译 | 示例
           

摘要

Dynamic behavior-based malware analysis and detection is considered to be one of the most promising ways to combat with the obfuscated and unknown malwares. To perform such analysis, behavioral feature abstraction plays a fundamental role, because how to specify program formally to a large extend determines what kind of algorithm can be used. In existing research, graph-based methods keep a dominant position in specifying malware behaviors. However, they restrict the detection algorithm to be chosen from graph mining algorithm. In this paper, we build a complete virtual environment to capture malware behaviors, especially that to stimulate network behaviors of a malware. Then, we study the problem of abstracting constant behavioral features from API call sequences and propose a minimal security-relevant behavior abstraction way, which absorbs the advantages of prevalent graph-based methods in behavior representation and has the following advantages: first API calls are aggregated by data dependence, therefore it is resistent to redundant data and is a kind of more constant feature. Second, API call arguments are also abstracted particularly, this further contributes to common and constant behavioral features of malware variants. Third, it is a moderate degree aggregation of a small group of API calls with a constructing criterion that centering on an independent operation on a sensitive resource. Fourth, it is very easy to embed the extracted behaviors in a high dimensional vector space, so that it can be processed by almost all of the prevalent statistical learning algorithms. We then evaluate these minimal security-relevant behaviors in three kinds of test, including similarity comparison, clustering and classification. The experimental results show that our method has a capacity in distinguishing malwares from different families and also from benign programs, and it is useful for many statistical learning algorithms.
机译:基于动态行为的恶意软件分析和检测被认为是与被混淆和未知的恶意软件作斗争的最有前途的方法之一。为了进行这样的分析,行为特征抽象起着根本性的作用,因为如何在很大程度上扩展形式化地指定程序就决定了可以使用哪种算法。在现有研究中,基于图的方法在指定恶意软件行为方面占据主导地位。但是,它们限制了从图挖掘算法中选择检测算法。在本文中,我们构建了一个完整的虚拟环境来捕获恶意软件的行为,尤其是刺激恶意软件的网络行为的环境。然后,我们研究了从API调用序列中提取恒定行为特征的问题,并提出了一种与安全性相关的最小行为抽象方法,该方法吸收了基于行为的流行图方法的优点,并且具有以下优点:聚集了第一个API调用因此,它可以抵抗冗余数据,并且是一种更稳定的功能。其次,API调用参数也特别抽象,这进一步有助于恶意软件变体的常见和持续行为特征。第三,它是一小组API调用的中等程度聚合,其构造标准以对敏感资源的独立操作为中心。第四,将提取的行为嵌入到高维向量空间中非常容易,因此几乎所有流行的统计学习算法都可以对其进行处理。然后,我们在三种测试中评估这些与安全性最小的行为,包括相似性比较,聚类和分类。实验结果表明,该方法具有区分不同家族和良性程序的恶意软件的能力,对许多统计学习算法都非常有用。

著录项

  • 来源
  • 作者单位

    School of Computer Science and Technology Xidian University">(1);

    School of Computer Science and Technology Xidian University">(2);

    School of Computer Science and Technology Xidian University">(3);

    School of Computer Science and Technology Xidian University">(4);

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号