...
首页> 外文期刊>Journal of computer sciences >Concordance and Term Frequency in Analyzing API Calls for Malware Behavior Detection
【24h】

Concordance and Term Frequency in Analyzing API Calls for Malware Behavior Detection

机译:分析API调用以进行恶意软件行为检测时的一致性和术语频率

获取原文
获取原文并翻译 | 示例

摘要

Application Programming Interface (API) is used for the software to interact with an operating system to do certain task such as opening fde, deleting file and many more. Programmers use this API to make it easier for their program to communicate with the operating system without having the knowledge of the hardware of the target system. Malware author is an attacker that may belong to an organization or work for themselves. Some malware author has the capabilities to write their own malware, uses the same kind of APIs that is used, to create normal programs to create malware. There are many researches done in this field, however, most researchers used n-gram to detect the sequence of API calls and although it gave good results, it is time consuming to process through all the output. This is the reason why this paper proposed to use Concordance to search for the API call sequence of a malware because it uses KWIC (Key Word in Context), thus only displayed the output based on the queried keyword. After that, Term Frequency (TF) is used to search for the most commonly used APIs in the dataset. The results of the experiment show that concordance can be used to search for API call sequence as we manage to identify six malicious behaviors (Install Itself at Startup, Enumerate All Process, Privilege Escalation, Terminate Process, Process Hollowing and Ant debugging) using this method. And based on the TF score, the most commonly used API in the dataset is the Reg Close Key (TF: 1.388), which on its own is not a dangerous API, hence we can infer that most API is not malicious in nature, it is how they were implemented is making them dangerous.
机译:应用程序编程接口(API)用于该软件与操作系统交互以执行某些任务,例如打开fde,删除文件等等。程序员使用此API使他们的程序更容易与操作系统进行通信,而无需了解目标系统的硬件。恶意软件作者是可能属于组织或为自己工作的攻击者。一些恶意软件作者具有编写自己的恶意软件的能力,使用与使用的API类型相同的功能,可以创建普通程序来创建恶意软件。这个领域有很多研究,但是,大多数研究人员使用n-gram来检测API调用的顺序,尽管它给出了很好的结果,但是处理所有输出却很耗时。这就是为什么本文提出使用Concordance搜索恶意软件的API调用序列的原因,因为它使用KWIC(上下文中的关键字),因此仅显示基于查询关键字的输出。之后,使用术语频率(TF)搜索数据集中最常用的API。实验结果表明,使用此方法,我们可以识别出六种恶意行为(在启动时自行安装,枚举所有进程,权限提升,终止进程,进程镂空和Ant调试),因此可以使用一致性来搜索API调用序列。 。基于TF分数,数据集中最常用的API是Reg Close Key(TF:1.388),它本身并不是危险的API,因此我们可以推断出大多数API本质上不是恶意的,它实施它们的方式使它们变得危险。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号