首页> 外文会议>2016 11th International Conference on Industrial and Information Systems >Windows malware detection based on cuckoo sandbox generated report using machine learning algorithm
【24h】

Windows malware detection based on cuckoo sandbox generated report using machine learning algorithm

机译:基于杜鹃沙箱使用机器学习算法生成的报告的Windows恶意软件检测

获取原文
获取原文并翻译 | 示例

摘要

Malicious software or malware has grown rapidly and many anti-malware defensive solutions have failed to detect the unknown malware since most of them rely on signature-based technique. This technique can detect a malware based on a pre-defined signature, which achieves poor performance when attempting to classify unseen malware with the capability to evade detection using various code obfuscation techniques. This growing evasion capability of new and unknown malwares needs to be countered by analyzing the malware dynamically in a sandbox environment, since the sandbox provides an isolated environment for analyzing the behavior of the malware. In this paper, the malware is executed on to the cuckoo sandbox to obtain its run-time behavior. At the end of the execution, the cuckoo sandbox reports the system calls invoked by the malware during execution. However, this report is in JSON format and has to be converted to MIST format to extract the system calls. The collected system calls are structured in the form of N-Grams, which help to build the classifier by using the Information Gain (IG) as a feature selection technique. A comprehensive experiment was conducted to perceive the best fit classifier among the chosen classifiers, including the Bayesian-Logistic-Regression, SPegasos, IB1, Bagging, Part, and J48 defined within the WEKA tool. From the experimental results, the overall best performance for all the selected top N-Grams such as 200, 400, and 600 goes to SPegasos with the highest accuracy, highest True Positive Rate (TPR), and lowest False Positive Rate (FPR).
机译:恶意软件或恶意软件增长迅速,并且许多反恶意软件防御解决方案未能检测到未知恶意软件,因为它们大多数依赖于基于签名的技术。该技术可以基于预定义的签名检测恶意软件,当尝试对看不见的恶意软件进行分类时,它具有使用各种代码混淆技术来逃避检测的能力,从而导致性能不佳。由于沙箱提供了一个隔离的环境来分析恶意软件的行为,因此需要通过在沙箱环境中动态分析恶意软件来应对新的和未知恶意软件不断增长的逃避能力。在本文中,该恶意软件将在杜鹃沙箱上执行以获取其运行时行为。在执行结束时,布谷鸟沙箱会报告恶意软件在执行过程中调用的系统调用。但是,此报告为JSON格式,必须将其转换为MIST格式以提取系统调用。收集的系统调用以N语法的形式进行结构化,通过使用信息增益(IG)作为功能选择技术来帮助构建分类器。进行了一项综合实验,以感知所选分类器中最合适的分类器,包括WEKA工具中定义的贝叶斯-逻辑回归,SPegasos,IB1,Bagging,Part和J48。从实验结果来看,所有选定的顶级N语法(例如200、400和600)的总体最佳性能都以最高的准确性,最高的真实肯定率(TPR)和最低的假阳性率(FPR)达到了SPegasos。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号