首页> 外文会议>International Conference on Industrial and Information Systems >Windows malware detection based on cuckoo sandbox generated report using machine learning algorithm
【24h】

Windows malware detection based on cuckoo sandbox generated report using machine learning algorithm

机译:基于Cuckoo Sandbox生成的报告的Windows Malware检测使用机器学习算法

获取原文
获取外文期刊封面目录资料

摘要

Malicious software or malware has grown rapidly and many anti-malware defensive solutions have failed to detect the unknown malware since most of them rely on signature-based technique. This technique can detect a malware based on a pre-defined signature, which achieves poor performance when attempting to classify unseen malware with the capability to evade detection using various code obfuscation techniques. This growing evasion capability of new and unknown malwares needs to be countered by analyzing the malware dynamically in a sandbox environment, since the sandbox provides an isolated environment for analyzing the behavior of the malware. In this paper, the malware is executed on to the cuckoo sandbox to obtain its run-time behavior. At the end of the execution, the cuckoo sandbox reports the system calls invoked by the malware during execution. However, this report is in JSON format and has to be converted to MIST format to extract the system calls. The collected system calls are structured in the form of N-Grams, which help to build the classifier by using the Information Gain (IG) as a feature selection technique. A comprehensive experiment was conducted to perceive the best fit classifier among the chosen classifiers, including the Bayesian-Logistic-Regression, SPegasos, IB1, Bagging, Part, and J48 defined within the WEKA tool. From the experimental results, the overall best performance for all the selected top N-Grams such as 200, 400, and 600 goes to SPegasos with the highest accuracy, highest True Positive Rate (TPR), and lowest False Positive Rate (FPR).
机译:恶意软件或恶意软件已迅速增长,许多反恶意软件防御解决方案未能检测到未知的恶意软件,因为大多数人都依赖于基于签名的技术。该技术可以基于预定义的签名检测恶意软件,这在尝试将视野恶意软件进行分类时实现不良性能,以使用各种代码混淆技术逃避检测。由于沙箱为分析了恶意软件的行为,因此需要通过在沙箱环境中动态分析恶意软件来对抗恶意软件来对抗新的和未知恶魔的逃避能力。在本文中,恶意软件被执行到Cuckoo Sandbox上以获得其运行时行为。在执行结束时,Cuckoo Sandbox报告执行在执行期间由恶意软件调用的系统调用。但是,此报告以JSON格式为单位,必须转换为MIST格式以提取系统调用。收集的系统调用以n-gram的形式构建,这有助于使用信息增益(IG)作为特征选择技术构建分类器。进行了全面的实验,以在所选分类器中感知最佳拟合分类器,包括在Weka工具中定义的贝叶斯逻辑回归,Spegasos,IB1,袋装,部分和J48。从实验结果中,所有选定的顶部N-克的总体性能,如200,400和600,最高精度,最高真实率(TPR)和最低误率(FPR)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号