Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks

Jixin Zhang1, Kehuan Zhang1, Zheng Qin2, Hui Yin2, Qixin Wu2
1Department of Information Engineering, Chinese University of Hong Kong, Hong Kong, China
2College of Computer Science and Electronic Engineering, Hunan University, Hunan, China

Tóm tắt

Từ khóa


Tài liệu tham khảo

ASPack, http://www.aspack.com (2017)

Bai H et al (2014) Approach for malware identification using dynamic behaviour and outcome triggering. IET Inf Secur 8(2):140–151

Calvet J et al (2012) Aligot: Cryptographic Function Identification in Obfuscated Binary Programs. In: Proc. of ACM Conference on Computer and Communications Security, pp 169–182

Canzanese R. et al. (2015) System call-based detection of malicious processes. In proc. of 2015 IEEE international conference on software quality, Reliability and Security, 119–24

Cesare S et al (2014) Control flow-based malware variant detection. IEEE Trans Dependable and Secure Comput 11(4):307–317

Coogan K et al (2009) Automatic Static Unpacking of Malware Binaries. In: Proc. of Working Conference on Reverse Engineering, pp 167–176

Esmaily J et al (2015) Intrusion detection system based on Multi-Layer Perceptron Neural Networks and Decision Tree. In: Proc. of IEEE Conference on Information and Knowledge Technology, pp 1–5

Euclidean Space, https://en.wikipedia.org/wiki/Euclidean_space (2017)

Fernándezcaballero A et al (2003) On motion detection through a multi-layer neural network architecture. Neural Netw 16(2):205–222

Gradient descent, https://en.wikipedia.org/wiki/Gradient_descent (2017)

Huang J et al (2014) AsDroid detecting stealthy behaviors in Android applications by user interface and program behavior contradiction. In: Proc. of ACM/IEEE International Conference on Software Engineering, pp 1036–1046

Jang J et al (2015) Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph. In: Proc. of the 23rd international conference on World wide web companion pp 731–34.

Kolosnjaji B et al (2016) Deep Learning for Classication of Malware System Call Sequences. In: Proc. of Australasian Joint Conference on Artificial Intelligence pp 137–149

Konrad R et al (2011) Automatic analysis of malware behavior using machine learning. J Comput Secur 19:639–668

Kullback-Leibler divergence, https://en.wikipedia.org/wiki/Kullback-Leibler_divergence (2018)

Kumar C et al (2012) Obfuscated Malware Detection Using API Call Dependency. In: Proc. Of ACM International Conference on Security of Internet of Things, pp 289–300

Li Z. et al.: VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. In Proc. of arXiv:1801.01681v1 [cs.CR] (2018)

Malwr, https://malwr.com / (2018)

Nataraj L et al (2011) A Comparative Assessment of Malware Classification using Binary Texture Analysis and Dynamic Analysis. In: Proc. of ACM Workshop on Security & Artificial Intelligence, pp 21–30

PCA, https://en.wikipedia.org/wiki/Principal_component_analysis (2017)

Peng H et al (2005) Feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy. IEEE Trans Pattern Anal Mach Intell 27(8):1226–1238

Raman K et al (2012) Selecting features to classify malware. In: InfoSec Southwest

Receiver Operating Characteristic, https://en.wikipedia.org/wiki/Receiver_operating_characteristic (2018)

Royal P et al (2006) PolyUnpack: Automating the Hidden-Code Extraction of Unpac Executing Malware. In: Proc. of 22nd Annual Computer Security Applications Conference, pp 289–300

Salai Selvam V et al (2011) Brain tumor detection using scalp eeg with modified Wavelet-ICA and multi layer feed forward neural network. In: Proc. of Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp 6104–6109

Salcedo Parra O et al (2014) Traffic forecasting using a multi layer perceptron model. In: Proc. of ACM symposium on QoS and security for wireless and mobile networks, pp 133–136

Santos I et al (2011) Opcode sequences as representation of executables for data mining based malware variant detection. Inf Sci 231(9):64–82

Santos I et al (2013) OPEM: A Static-Dynamic Approach for Machine Learning Base Malware Detection. In: Proc. of International Conference CISIS’12, pp 271–280

Shehu Z et al (2016) Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware. In: Proc. of IEEE International Conference on Next Generation Mobile Applications, Security and Technologies, pp 289–300

Suarez-Tangil G et al (2016) ALTERDROID: differential fault analysis of obfuscated smart-phone malware. IEEE Trans Mob Comput 15(4):789–802

Treadwell S et al (2009) A Heuristic Approach for Detection of Obfuscated Malware. In: Proc. of IEEE International Conference on Intelligence & Security Informatics, pp 291–299

UPX, https://upx.github.io (2017)

VMProtect, https://vmpsoft.com/products/vmprotect/ (2017)

VX Heaven, https://hypestat.com/info/vxheaven.org (2017)

Xu L et al (2016) Dynamic Android Malware Classification Using Graph-Based Representations. In: Proc. of IEEE International Conference on Cyber Security and Cloud Computing, pp 220–231

W. Yang et al. (2015) AppContext: differentiating malicious and benign mobile app behaviors using context. In: Proc. of IEEE/ACM International Conference on Software Engineering (2015), Firenze, Italy, pp 303–313

Zhang J et al (2016a) Malware Variant Detection Using Opcode Image Recognition with Small Training Sets. In: Proc. of IEEE International Conference on Computer Communication and Networks, pp 1–9

Zhang J et al (2016b) IRMD: Malware Variant Detection Using Opcode Image Recognition. In: Proc. of IEEE International Conference on Parallel and Distributed Systems, pp 1175–1180

Zhang H et al (2016c) Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery. ACM Transactions on Privacy and Security 19(2):article 4

ZProtect, https://tuts4you.com/download.php?view.3017 (2017)