...
首页> 外文期刊>Expert Systems with Application >Novel active learning methods for enhanced PC malware detection in windows OS
【24h】

Novel active learning methods for enhanced PC malware detection in windows OS

机译:用于Windows OS中增强的PC恶意软件检测的新型主动学习方法

获取原文
获取原文并翻译 | 示例

摘要

The formation of new malwares every day poses a significant challenge to anti-virus vendors since anti-virus tools, using manually crafted signatures, are only capable of identifying known malware instances and their relatively similar variants. To identify new and unknown malwares for updating their anti-virus signature repository, anti-virus vendors must daily collect new, suspicious files that need to be analyzed manually by information security experts who then label them as malware or benign. Analyzing suspected files is a time-consuming task and it is impossible to manually analyze all of them. Consequently, anti-virus vendors use machine learning algorithms and heuristics in order to reduce the number of suspect files that must be inspected manually. These techniques, however, lack an essential element - they cannot be daily updated. In this work we introduce a solution for this updatability gap. We present an active learning (AL) framework and introduce two new AL methods that will assist anti-virus vendors to focus their analytical efforts by acquiring those files that are most probably malicious. Those new AL methods are designed and oriented towards new malware acquisition. To test the capability of our methods for acquiring new malwares from a stream of unknown files, we conducted a series of experiments over a ten-day period. A comparison of our methods to existing high performance AL methods and to random selection, which is the naive method, indicates that the AL methods outperformed random selection for all performance measures. Our AL methods outperformed existing AL method in two respects, both related to the number of new malwares acquired daily, the core measure in this study. First, our best performing AL method, termed "Exploitation", acquired on the 9th day of the experiment about 2.6 times more malwares than the existing AL method and 7.8 more times than the random selection. Secondly, while the existing AL method showed a decrease in the number of new malwares acquired over 10 days, our AL methods showed an increase and a daily improvement in the number of new malwares acquired. Both results point towards increased efficiency that can possibly assist anti-virus vendors.
机译:每天都会形成新的恶意软件,这对反病毒供应商构成了严峻的挑战,因为使用手工制作的签名的反病毒工具只能识别已知的恶意软件实例及其相对类似的变体。为了识别新的和未知的恶意软件以更新其防病毒签名存储库,防病毒供应商必须每天收集需要由信息安全专家手动分析的新的可疑文件,然后再将其标记为恶意软件或良性文件。分析可疑文件是一项耗时的任务,无法手动分析所有文件。因此,防病毒供应商使用机器学习算法和试探法来减少必须手动检查的可疑文件的数量。但是,这些技术缺乏必要的要素-无法每日更新。在这项工作中,我们介绍了针对此可升级性差距的解决方案。我们提出了一个主动学习(AL)框架,并介绍了两种新的AL方法,这些方法将帮助反病毒供应商通过获取最有可能是恶意的文件来集中精力进行分析。这些新的AL方法经过设计并面向新的恶意软件获取。为了测试我们从未知文件流中获取新恶意软件的方法的功能,我们在十天内进行了一系列实验。将我们的方法与现有的高性能AL方法以及作为天真的方法的随机选择进行比较,表明AL方法在所有性能指标方面都优于随机选择。我们的AL方法在两个方面都优于现有的AL方法,这两个方面都与每天获取的新恶意软件的数量有关,这是本研究的核心指标。首先,我们在实验的第9天获得了性能最好的AL方法,称为“漏洞利用”,其恶意软件的数量是现有AL方法的2.6倍,是随机选择的7.8倍。其次,虽然现有的AL方法在10天内显示出新恶意软件的数量有所减少,但我们的AL方法却显示出新获取的恶意软件的数量有所增加,并且每天都有所改善。两种结果都表明可以提高效率,这可能有助于反病毒供应商。

著录项

  • 来源
    《Expert Systems with Application》 |2014年第13期|5843-5857|共15页
  • 作者单位

    Telekom Innovation Laboratories at Ben-Gurion University, Department of Information Systems Engineering, Ben-Gurion University of the Negev, P.O.B 653, Be'erSheva 84105, Israel;

    Telekom Innovation Laboratories at Ben-Gurion University, Department of Information Systems Engineering, Ben-Gurion University of the Negev, P.O.B 653, Be'erSheva 84105, Israel;

    Telekom Innovation Laboratories at Ben-Gurion University, Department of Information Systems Engineering, Ben-Gurion University of the Negev, P.O.B 653, Be'erSheva 84105, Israel;

    Telekom Innovation Laboratories at Ben-Gurion University, Department of Information Systems Engineering, Ben-Gurion University of the Negev, P.O.B 653, Be'erSheva 84105, Israel;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Malware; Malicious code; Machine Learning; Active learning; SVM;

    机译:恶意软件;恶意代码;机器学习;主动学习;支持向量机;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号