首页> 外文会议>Recent advances in intrusion detection >PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
【24h】

PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime

机译:PE-Miner:挖掘结构信息以实时检测恶意可执行文件

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. previously unknown) malware. The distinguishing features are extracted using the structural information standardized by the Microsoft Windows operating system for executables, DLLs and object files. We follow a threefold research methodology: (1) identify a set of structural features for PE files which is computable in realtime, (2) use an efficient preprocessor for removing redundancy in the features' set, and (3) select an efficient data mining algorithm for final classification between benign and malicious executables.rnWe have evaluated PE-Miner on two malware collections, VX Heavens and Malfease datasets which contain about 11 and 5 thousand malicious PE files respectively. The results of our experiments show that PE-Miner achieves more than 99% detection rate with less than 0.5% false alarm rate for distinguishing between benign and malicious executables. PE-Miner has low processing overheads and takes only 0.244 seconds on the average to scan a given PE file. Finally, we evaluate the robustness and reliability of PE-Miner under several regression tests. Our results show that the extracted features are robust to different packing techniques and PE-Miner is also resilient to majority of crafty evasion strategies.
机译:在本文中,我们提出了一种准确且实时的PE-Miner框架,该框架可从便携式可执行文件(PE)中自动提取区别特征以检测零时差(即以前未知)的恶意软件。区别特征是使用Microsoft Windows操作系统针对可执行文件,DLL和目标文件标准化的结构信息提取的。我们采用三方面的研究方法:(1)为PE文件确定一组可实时计算的结构特征;(2)使用高效的预处理器来消除特征集中的冗余;以及(3)选择有效的数据挖掘我们对两个恶意软件集合(VX Heavens和Malfease数据集)分别评估了PE-Miner,该数据集分别包含约11个和5,000个恶意PE文件。我们的实验结果表明,PE-Miner可以区分良性和恶意可执行文件,检测率达到99%以上,错误警报率不到0.5%。 PE-Miner的处理开销很低,平均只需要0.244秒即可扫描给定的PE文件。最后,我们通过几个回归测试评估了PE-Miner的鲁棒性和可靠性。我们的结果表明,提取的特征对于不同的包装技术具有鲁棒性,PE-Miner对大多数狡猾的逃避策略也具有弹性。

著录项

  • 来源
  • 会议地点 Saint-Malo(FR);Saint-Malo(FR)
  • 作者单位

    Next Generation Intelligent Networks Research Center (nexGIN RC) National University of Computer Emerging Sciences (FAST-NUCES) Islamabad, 44000, Pakistan;

    Next Generation Intelligent Networks Research Center (nexGIN RC) National University of Computer Emerging Sciences (FAST-NUCES) Islamabad, 44000, Pakistan School of Electrical Engineering Computer Science (SEECS) National University of Sciences Technology (NUST) Islamabad, 44000, Pakistan;

    School of Electrical Engineering Computer Science (SEECS) National University of Sciences Technology (NUST) Islamabad, 44000, Pakistan Next Generation Intelligent Networks Research Center (nexGIN RC) National University of Computer Emerging Sciences (FAST-NUCES) Islamabad, 44000, Pakistan;

    Next Generation Intelligent Networks Research Cente;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 安全保密;
  • 关键词

    data mining; malicious executable detection; malware detection; portable executables; structural information;

    机译:数据挖掘;恶意可执行文件检测;恶意软件检测;可移植的可执行文件;结构信息;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号