首页> 外文期刊>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences >Catching the Behavioral Differences between Multiple Executions for Malware Detection
【24h】

Catching the Behavioral Differences between Multiple Executions for Malware Detection

机译:捕获多个执行之间的行为差​​异以进行恶意软件检测

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

As the number of new malware has increased explosively, traditional malware detection approaches based on pattern matching have been less effective. Therefore, it is important to develop a detection method which relies on not signatures but characteristic behaviors of malware. Recently, malware authors have been embedding functions for countermea-sure against malware analyses and detections into malware. Accordingly, modern malware often changes their runtime behaviors in each execution to tolerate against malware analyses and detections. For example, when malware copies itself on a file system, it can randomly determine its file name for avoiding the detections. Another example is that when malware tries to connect its command and control server, it randomly chooses a domain name from a hard-coded domain name list to avoid being blocked by a static blacklist of malicious domain names. We assume that such evasive behaviors are unnecessary for benign software. Therefore the behaviors can be the clues to distinguish malware from benign software. In this paper, we propose a novel behavior-based malware detection method which focuses attention on such characteristics. Our proposed method conducts dynamic analysis on an executable file multiple times in same sandbox environment so as to obtain plural lists of API call sequences and plural traffic logs, and then compares the lists and the logs to find the difference between the multiple executions. In the experiments with 5,697 malware samples and 819 benign software samples, we can detect about 70% malware samples and the false positive rate is about 1 %. In addition, we can detect about 50% malware samples which were not detected by each Anti-Virus Software engine. Therefore we confirm the possibility the proposed method may be able to improve the accuracy of malware detection utilizing in combination with other existing methods.
机译:随着新恶意软件数量的爆炸性增长,基于模式匹配的传统恶意软件检测方法的有效性降低。因此,重要的是开发一种不依赖于签名而是依赖于恶意软件的特征行为的检测方法。最近,恶意软件作者已经嵌入了针对恶意软件分析和检测的对策,并将其嵌入恶意软件中。因此,现代恶意软件经常在每次执行中更改其运行时行为,以容忍恶意软件的分析和检测。例如,当恶意软件在文件系统上复制自身时,它可以随机确定其文件名以避免检测。另一个示例是,当恶意软件尝试连接其命令和控制服务器时,它会从硬编码的域名列表中随机选择一个域名,以避免被恶意域名的静态黑名单所阻止。我们假设这种逃避行为对于良性软件是不必要的。因此,这些行为可能是区分恶意软件与良性软件的线索。在本文中,我们提出了一种新颖的基于行为的恶意软件检测方法,该方法将注意力集中在此类特征上。我们提出的方法在相同的沙盒环境中对可执行文件进行多次动态分析,以获得API调用序列的多个列表和多个流量日志,然后将这些列表和日志进行比较,以找出多个执行之间的差异。在对5,697个恶意软件样本和819个良性软件样本的实验中,我们可以检测到大约70%的恶意软件样本,假阳性率约为1%。此外,我们可以检测到大约50%的恶意软件样本,而每个反病毒软件引擎均未检测到。因此,我们确认了所提出的方法可能能够结合其他现有方法来提高恶意软件检测的准确性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号