首页> 外文会议>International Conference on Information and Communications Security >Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks
【24h】

Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks

机译:使用多层LSTM网络检测变质恶意软件包装器

获取原文

摘要

Malware authors do their best to conceal their malicious software to increase its probability of spreading and to slow down analysis. One method used to conceal malware is packing, in which the original malware is completely hidden through compression or encryption, only to be reconstructed at run-time. In addition, packers can be metamorphic, meaning that the output of the packer will never be exactly the same, even if the same file is packed again. As the use of known off-the-shelf malware packers is declining, it is becoming increasingly more important to implement methods of detecting packed executables without having any known samples of a given packer. In this study, we evaluate the use of recurrent neural networks as a means to classify whether or not a file is packed by a metamorphic packer. We show that even with quite simple networks, it is possible to correctly distinguish packed executables from non-packed executables with an accuracy of up to 89.36% when trained on a single packer, even for samples packed by previously unseen packers. Training the network on more packer raises this number to up to 99.69%).
机译:恶意软件作者尽最大努力隐藏他们的恶意软件,以提高其扩散和减慢分析的可能性。用于隐藏恶意软件的一种方法是打包,其中原始恶意软件通过压缩或加密完全隐藏,仅在运行时重建。此外,包装器可以是变质的,这意味着封隔器的输出永远不会完全相同,即使再次包装相同的文件。由于已知的离心软件包装器的使用是下降的,因此实现检测包装可执行文件的方法变得越来越重要,而不具有给定封隔器的任何已知样本。在这项研究中,我们评估使用经常性神经网络作为分类文件是否由变形包装器包装的方法。我们表明即使具有相当简单的网络,也可以在单个包装器上培训时,正确地将填充的可执行文件从非打包的可执行文件与非打包的可执行文件区分开,精度高达89.36%,即使对于先前未操作包装器包装的样本,即使是用于包装的样本。培训更多包装机的网络将此数字提高至高达99.69%)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号