DocumentCode
2882040
Title
Machine learning for attack vector identification in malicious source code
Author
Benjamin, Victor A. ; Hsinchun Chen
Author_Institution
Dept. of Manage. Inf. Syst., Univ. of Arizona, Tucson, AZ, USA
fYear
2013
fDate
4-7 June 2013
Firstpage
21
Lastpage
23
Abstract
As computers and information technologies become ubiquitous throughout society, the security of our networks and information technologies is a growing concern. As a result, many researchers have become interested in the security domain. Among them, there is growing interest in observing hacker communities for early detection of developing security threats and trends. Research in this area has often reported hackers openly sharing cybercriminal assets and knowledge with one another. In particular, the sharing of raw malware source code files has been documented in past work. Unfortunately, malware code documentation appears often times to be missing, incomplete, or written in a language foreign to researchers. Thus, analysis of such source files embedded within hacker communities has been limited. Here we utilize a subset of popular machine learning methodologies for the automated analysis of malware source code files. Specifically, we explore genetic algorithms to resolve questions related to feature selection within the context of malware analysis. Next, we utilize two common classification algorithms to test selected features for identification of malware attack vectors. Results suggest promising direction in utilizing such techniques to help with the automated analysis of malware source code.
Keywords
computer crime; genetic algorithms; invasive software; learning (artificial intelligence); pattern classification; peer-to-peer computing; source coding; automated malware source code file analysis; classification algorithm; cybercriminal asset sharing; feature selection; genetic algorithm; hacker community; information technology; machine learning; malicious source code; malware attack vector identification; malware code documentation; security domain; security threat detection; Accuracy; Biological cells; Communities; Computer hacking; Malware; Support vector machine classification; Cyber security; Malware analysis; Static analysis;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on
Conference_Location
Seattle, WA
Print_ISBN
978-1-4673-6214-6
Type
conf
DOI
10.1109/ISI.2013.6578779
Filename
6578779
Link To Document