Bio-inspired data mining: Treating malware signatures as biosequences
نویسندگان
چکیده
The application of machine learning to bioinformatics problems is well established. Less well understood is the application of bioinformatics techniques to machine learning and, in particular, the representation of non-biological data as biosequences. The aim of this paper is to explore the effects of giving amino acid representation to problematic machine learning data and to evaluate the benefits of supplementing traditional machine learning with bioinformatics tools and techniques. The signatures of 60 computer viruses and 60 computer worms were converted into amino acid representations and first multiply aligned separately to identify conserved regions across different families within each class (virus and worm). This was followed by a second alignment of all 120 aligned signatures together so that nonconserved regions were identified prior to input to a number of machine learning techniques. Differences in length between virus and worm signatures after the first alignment were resolved by the second alignment. Our first set of experiments indicates that representing computer malware signatures as amino acid sequences followed by alignment leads to greater classification and prediction accuracy. Our second set of experiments indicates that checking the results of data mining from artificial virus and worm data against known proteins can lead to generalizations being made from the domain of naturally occurring proteins to malware signatures. However, further work is needed to determine the advantages and disadvantages of different representations and sequence alignment methods for handling problematic machine learning data. All data, machine learning and biological tools used in this paper are publicly available and free. Computer malware signatures were downloaded from VX heavens: www.vxheavens.com. The multiple sequence alignment techniques were ClustalW and T-Coffee from EBI: www.ebi.ac.uk/Tools/msa/tcoffee. Various data mining functions within Weka (Waikato Environment for Knowledge Analysis) were used for machine learning involving cross-validation, rule extraction and classification: www.cs.waikato.ac.nz/ml/weka. Biological match of consensuses and meta-signatures was checked through the PRINTS database available via Motif3D at the University of Manchester http://www.bioinf.manchester.ac.uk/dbbrowser/motif3d/motif3d.html and FingerPRINTScan at the EBI (http address above). QUARK and the Protein Data Bank were used for consensus modeling and protein matching: zhanglab.ccmb.med.umich.edu/QUARK/ and www.pdb.org/pdb/home/home.do, respectively. The National Centre for Biotechnology Information (NCBI) was used for checking the biological function of matched proteins: ncbi.nlm.nih.gov/. The commercial package SPSS v19 was used for statistical analysis of alignment lengths and accuracy results by T tests and analysis of variance. Corresponding author: Ajit Narayanan, [email protected]. Tel: +64 9921 9345; Fax: +64 9921 9944
منابع مشابه
The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures
The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). Malware modelling has focused primarily on semantics due to the intended actions and behaviours of viral and worm code. The aim of this pape...
متن کاملDetection of Malware by using Sequence Alignment Strategy and Data Mining Techniques
Malware is basically malicious software or programs which are a major challenge or major threats. for the computer and different computer applications in the field of IT and cyber security. Traditional anti-viral packages and their upgrades are typically released only after the malware’s key characteristics have been identified through infection. But by this time it may be too late to protect s...
متن کاملELF-Miner: Using Structural Knowledge and Data Mining for Detecting Linux Malicious Executables
Linux malware can pose a significant threat – its (Linux) penetration is exponentially increasing – because little is known or understood about its vulnerabilities. We believe that now is the right time to devise non-signature based zero-day (previously unknown) malware detection strategies before Linux intruders take us by surprise. Therefore, in this paper, we first do a forensic analysis of ...
متن کاملDetecting Trojans Using Data Mining Techniques
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitimate program. Traditional approaches using signatures to detect these programs pose little danger to new and unseen samples whose signatures are not available. The focus of malware research is shifting from using signature patterns to identifying the malicious behavior displayed by these malwares....
متن کاملMining Malware Specifications through Static Reachability Analysis
The number of malicious software (malware) is growing out of control. Syntactic signature based detection cannot cope with such growth and manual construction of malware signature databases needs to be replaced by computer learning based approaches. Currently, a single modern signature capturing the semantics of a malicious behavior can be used to replace an arbitrarily large number of old-fash...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1302.3668 شماره
صفحات -
تاریخ انتشار 2013