Differentiating malware from cleanware using behavioural analysis


Autoria(s): Tian, Ronghua; Islam, Rafiqul; Batten, Lynn; Versteeg, Steve
Contribuinte(s)

[Unknown]

Data(s)

01/01/2010

Resumo

This paper proposes a scalable approach for distinguishing malicious files from clean files by investigating the behavioural features using logs of various API calls. We also propose, as an alternative to the traditional method of manually identifying malware files, an automated classification system using runtime features of malware files. For both projects, we use an automated tool running in a virtual environment to extract API call features from executables and apply pattern recognition algorithms and statistical methods to differentiate between files. Our experimental results, based on a dataset of 1368 malware and 456 cleanware files, provide an accuracy of over 97% in distinguishing malware from cleanware. Our techniques provide a similar accuracy for classifying malware into families. In both cases, our results outperform comparable previously published techniques.

Identificador

http://hdl.handle.net/10536/DRO/DU:30033827

Idioma(s)

eng

Publicador

IEEE

Relação

http://dro.deakin.edu.au/eserv/DU:30033827/islam-MALWARE-evidence-2010.pdf

http://dro.deakin.edu.au/eserv/DU:30033827/islam-differentiatingmalware-2010.pdf

http://dx.doi.org/10.1109/MALWARE.2010.5665796

Direitos

2010, Institute of Electrical and Electronics Engineers (IEEE)

Palavras-Chave #malware #strings #API #dynamic
Tipo

Conference Paper