Malware target recognition via static heuristics

نویسندگان

  • Thomas E. Dube
  • Richard A. Raines
  • Gilbert L. Peterson
  • Kenneth W. Bauer
  • Michael R. Grimaila
  • Steven K. Rogers
چکیده

Organizations increasingly rely on the confidentiality, integrity and availability of their information and communications technologies to conduct effective business operations while maintaining their competitive edge. Exploitation of these networks via the introduction of undetected malware ultimately degrades their competitive edge, while taking advantage of limited network visibility and the high cost of analyzing massive numbers of programs. This article introduces the novel Malware Target Recognition (MaTR) system which combines the decision tree machine learning algorithm with static heuristic features for malware detection. By focusing on contextually important static heuristic features, this research demonstrates superior detection results. Experimental results on large sample datasets demonstrate near ideal malware detection performance (99.9+% accuracy) with low false positive (8.73e-4) and false negative rates (8.03e-4) at the same point on the performance curve. Test results against a set of publicly unknown malware, including potential advanced competitor tools, show MaTR’s superior detection rate (99%) versus the union of detections from three commercial antivirus products (60%). The resulting model is a fine granularity sensor with potential to dramatically augment cyberspace situation awareness.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Heuristics-based Static Analysis Approach for Detecting Packed PE Binaries

Malware authors evade the signature based detection by packing the original malware using custom packers. In this paper, we present a static heuristics based approach for the detection of packed executables. We present 1) the PE heuristics considered for analysis and taxonomy of heuristics; 2) a method for computing the score using power distance based on weights and risks assigned to the defin...

متن کامل

An Intelligent Methodology for Malware Detection in Android Smartphones Based Static Analysis

Recently, a lot of mobile phone users are rapidly switching to smartphones, and, many users download mobile applications without any thought of security. Therefore, smartphones are interesting target for malware, especially with Android devices. So, it is too important to use a methodology to detect the malware applications before installing it on the phones. In this paper we propose an effecti...

متن کامل

Evading Machine Learning Malware Detection

Machine learning is a popular approach to signatureless malware detection because it can generalize to never-beforeseen malware families and polymorphic strains. This has resulted in its practical use for either primary detection engines or supplementary heuristic detections by anti-malware vendors. Recent work in adversarial machine learning has shown that models are susceptible to gradient-ba...

متن کامل

Adaptive Semantics-Aware Malware Classification

Automatic malware classification is an essential improvement over the widely-deployed detection procedures using manual signatures or heuristics. Although there exists an abundance of methods for collecting static and behavioral malware data, there is a lack of adequate tools for analysis based on these collected features. Machine learning is a statistical solution to the automatic classificati...

متن کامل

Testing of “ Dynamic Detection ”

As malicious software threats have changed, the anti-malware products have had to evolve, too. Simple signature-based detection proved to have downsides when having to deal with thousands of new malware samples daily. It takes time to process a sample and make a signature available. In the meantime a customer’s system remains completely unprotected from that particular threat. Hence heuristic d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2012