首页> 外文会议>International Symposium on Cyber Security Cryptography and Machine Learning >Malware Triage Based on Static Features and Public APT Reports
【24h】

Malware Triage Based on Static Features and Public APT Reports

机译:基于静态功能和公共APT报告的恶意软件分类

获取原文

摘要

Understanding the behavior of malware requires a semiautomatic approach including complex software tools and human analysts in the loop. However, the huge number of malicious samples developed daily calls for some prioritization mechanism to carefully select the samples that really deserve to be further examined by analysts. This avoids computational resources be overloaded and human analysts saturated. In this paper we introduce a malware triage stage where samples are quickly and automatically examined to promptly decide whether they should be immediately dispatched to human analysts or to other specific automatic analysis queues, rather than following the common and slow analysis pipeline. Such triage stage is encapsulated into an architecture for semi-automatic malware analysis presented in a previous work. In this paper we propose an approach for sample prioritization, and its realization within such architecture. Our analysis in the paper focuses on malware developed by Advanced Persistent Threats (APTs). We build our knowledge base, used in the triage, on known APTs obtained from publicly available reports. To make the triage as fast as possible, only static malware features are considered, which can be extracted with negligible delay, without the necessity of executing the malware samples, and we use them to train a random forest classifier. The classifier has been tuned to maximize its precision, so that analysts and other components of the architecture are mostly likely to receive only malware correctly identified as being similar to known APT, and do not waste important resources on false positives. A preliminary analysis shows high precision and accuracy, as desired.
机译:了解恶意软件的行为需要一个半自动方法,包括循环中的复杂软件工具和人类分析师。然而,大量恶意样本开发了日常调用一些优先级机制,以便仔细选择真正应得的分析师进一步检查的样本。这避免了饱和的计算资源和人类分析师饱和。在本文中,我们介绍了一个恶意软件分类阶段,其中样本很快并自动检查,以便及时决定是否应该立即派往人类分析师或其他特定的自动分析队列,而不是遵循普通和慢速分析管道。这种分类阶段被封装在一个架构中,用于在上一个工作中呈现的半自动恶意软件分析。在本文中,我们提出了一种方法优先考虑的方法,以及在这种建筑内的实现。我们在论文中的分析侧重于通过高级持久威胁(APTS)开发的恶意软件。我们建立我们在分类中使用的知识库,了解从公开的报告中获得的已知APTS。为了尽可能快地进行分类,只考虑静态恶意软件功能,可以通过可忽略不计的延迟来提取,而无需执行恶意软件样本,并且我们使用它们来培训一个随机林类分类器。分类器已被调整为最大化其精度,以便分析师和架构的其他组件主要可能仅接收正确识别的恶意软件与已知的APT类似,并且不会在误报上浪费重要资源。根据需要,初步分析显示出高精度和准确性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号