Detecting unknown anomalous program behavior using API system calls


Autoria(s): Islam, Md. Rafiqul; Islam, Md. Saiful; Chowdhury, Morshed U.
Contribuinte(s)

Manaf, Azizah Abd

Sahibuddin, Shamsul

Ahmad, Rabiah

Daud, Salwani Mohd

El-Qawasmeh, Eyas

Data(s)

01/01/2011

Resumo

This paper presents the detection techniques of anomalous programs based on the analysis of their system call traces. We collect the API calls for the tested executable programs from Microsoft detour system and extract the features for our classification task using the previously established n-gram technique. We propose three different feature extraction approaches in this paper. These are frequency-based, time-based and a hybrid approach which actually combines the first two approaches. We use the well-known classifier algorithms in our experiments using WEKA interface to classify the malicious programs from the benign programs. Our empirical evidence demonstrates that the proposed feature extraction approaches can detect malicious programs over 88% which is quite promising for the contemporary similar research.<br />

Identificador

http://hdl.handle.net/10536/DRO/DU:30043156

Idioma(s)

eng

Publicador

Springer

Relação

http://dro.deakin.edu.au/eserv/DU:30043156/islam-detectingunknown-2011.pdf

http://dro.deakin.edu.au/eserv/DU:30043156/islam-detectingunknown-evidence-2011.pdf

http://hdl.handle.net/10.1007/978-3-642-25483-3_31

Direitos

2011, Springer-Verlag Berlin Heidelberg

Palavras-Chave #malicious program #API system calls #classification
Tipo

Book Chapter