...
首页> 外文期刊>Journal in computer virology >Malware classification based on call graph clustering
【24h】

Malware classification based on call graph clustering

机译:基于调用图聚类的恶意软件分类

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Each day, anti-virus companies receive tens of thousands samples of potentially harmful executables. Many of the malicious samples are variations of previously encountered malware, created by their authors to evade pattern-based detection. Dealing with these large amounts of data requires robust, automatic detection approaches. This paper studies malware classification based on call graph clustering. By representing malware samples as call graphs, it is possible to abstract certain variations away, enabling the detection of structural similarities between samples. The ability to cluster similar samples together will make more generic detection techniques possible, thereby targeting the commonalities of the samples within a cluster. To compare call graphs mutually, we compute pairwise graph similarity scores via graph matchings which approximately minimize the graph edit distance. Next, to facilitate the discovery of similar malware samples, we employ several clustering algorithms, including k-medoids and Density-Based Spatial Clustering of Applications with Noise (DBSCAN). Clustering experiments are conducted on a collection of real malware samples, and the results are evaluated against manual classifications provided by human malware analysts. Experiments show that it is indeed possible to accurately detect malware families via call graph clustering. We anticipate that in the future, call graphs can be used to analyse the emergence of new malware families, and ultimately to automate implementation of generic detection schemes.
机译:每天,反病毒公司都会收到成千上万个潜在有害可执行文件的样本。许多恶意样本是以前遇到的恶意软件的变体,由其作者创建,以逃避基于模式的检测。处理这些大量数据需要强大的自动检测方法。本文研究基于调用图聚类的恶意软件分类。通过将恶意软件样本表示为调用图,可以将某些变异抽象化,从而可以检测样本之间的结构相似性。将相似样本聚类在一起的能力将使更多的通用检测技术成为可能,从而针对聚类中样本的共性。为了相互比较调用图,我们通过图匹配计算成对图相似度得分,从而使图编辑距离最小化。接下来,为了促进发现相似的恶意软件样本,我们采用了几种聚类算法,包括k型聚类和基于密度的基于噪声的应用程序空间聚类(DBSCAN)。对一组真实的恶意软件样本进行聚类实验,然后根据人类恶意软件分析师提供的手动分类对结果进行评估。实验表明,通过调用图聚类确实可以准确检测恶意软件家族。我们预计,将来,调用图可用于分析新恶意软件家族的出现,并最终实现通用检测方案的自动化。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号