...
首页> 外文期刊>International Journal of Information Security >Dynamic malware detection and phylogeny analysis using process mining
【24h】

Dynamic malware detection and phylogeny analysis using process mining

机译:使用Process Mining的动态恶意软件检测和系统发育分析

获取原文
获取原文并翻译 | 示例

摘要

In the last years, mobile phones have become essential communication and productivity tools used daily to access business services and exchange sensitive data. Consequently, they also have become one of the biggest targets of malware attacks. New malware is created everyday, most of which is generated as variants of existing malware by reusing its malicious code. This paper proposes an approach for malware detection and phylogeny studying based on dynamic analysis using process mining. The approach exploits process mining techniques to identify relationships and recurring execution patterns in the system call traces gathered from a mobile application in order to characterize its behavior. The recovered characterization is expressed in terms of a set of declarative constraints between system calls and represents a sort of run-time fingerprint of the application. The comparison between the so defined fingerprint of a given application with those of known malware is used to verify: (1) if the application is malware or trusted, (2) in case of malware, which family it belongs to, and (3) how it differs from other known variants of the same malware family. An empirical study conducted on a dataset of 1200 trusted and malicious applications across ten malware families has shown that the approach exhibits a very good discrimination ability that can be exploited for malware detection and malware evolution studying. Moreover, the study has also shown that the approach is robust to code obfuscation techniques increasingly being used by nowadays malware.
机译:在过去几年中,移动电话已成为每天用于访问业务服务和交换敏感数据的基本通信和生产力工具。因此,它们也已成为恶意软件攻击的最大目标之一。每天创建新的恶意软件,大多数是通过重用其恶意代码作为现有恶意软件的变体而生成的。本文提出了一种利用工艺采矿基于动态分析的恶意软件检测和系统发生研究的方法。该方法利用处理挖掘技术来识别从移动应用程序收集的系统呼叫跟踪中的关系和重复执行模式,以便表征其行为。恢复的表征以系统调用之间的一组声明性约束表示,并且表示应用程序的一种运行时指纹。带有已知恶意软件的给定应用程序的所定义指纹之间的比较来验证:(1)如果应用程序是恶意软件或可信的,(2)如果是恶意软件,它属于哪个家庭,以及(3)它如何与同一恶意软件系列的其他已知变体不同。在十个恶意软件系列的1200名可信和恶意应用程序的数据集上进行的实证研究表明,该方法展示了非常好的歧视能力,可以利用恶意软件检测和恶意软件演进研究。此外,该研究还表明,该方法对于逐步使用的代码混淆技术越来越多地被当今恶意软件使用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号