首页> 外文会议>IEEE/ACS International Conference on Computer Systems and Applications >A compression-based technique to classify metamorphic malware
【24h】

A compression-based technique to classify metamorphic malware

机译:基于压缩的技术来对变形恶意软件进行分类

获取原文

摘要

Metamorphic malware are able to change their appearance to evade detection by traditional anti-malware software. One of the ways to help mitigate the threat of new metamorphic malware is to determine their origins, i.e., the families to which they belong. This type of metamorphic malware analysis is not typically handled by commercial software. Moreover, existing works rely on analyzing the op-code sequences extracted from the Assembly files of the malware. Very few papers have tried to perform analysis on the binary files of the malware. However, they focused on the simple binary problem of differentiating between a certain malware family and benign files. In this work, we address the more difficult problem of determining the origin of a new metamorphic malware by measuring its similarity to hundreds of variants taken from 13 families of real malware. To address this problem, we use a compression-based classification approach. We experiment with two such approaches: AMDL and BCN. The results showed that AMDL performed no better than a random guess (11% accuracy for AMDL and 18% for the random baseline). On the other hand, BCN performed really well with 67% accuracy.
机译:变态恶意软件能够更改其外观,以逃避传统反恶意软件的检测。帮助减轻新型变态恶意软件威胁的方法之一是确定其起源,即它们所属的家庭。这种类型的变态恶意软件分析通常不由商业软件处理。而且,现有的工作依赖于分析从恶意软件的汇编文件中提取的操作码序列。很少有论文尝试对恶意软件的二进制文件进行分析。但是,他们专注于区分特定恶意软件家族和良性文件的简单二进制问题。在这项工作中,我们通过测量新变态恶意软件与来自13个真实恶意软件家族的数百种变种的相似性,解决了确定新变态恶意软件的来源这一更棘手的问题。为了解决这个问题,我们使用了基于压缩的分类方法。我们尝试了两种方法:AMDL和BCN。结果表明,AMDL的表现不比随机猜测好(AMDL的准确度为11%,随机基线的准确度为18%)。另一方面,BCN的准确度非常好,达到67%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号