Title :
Identifying malware genera using the Jensen-Shannon distance between system call traces
Author :
Seideman, Jeremy D. ; Khan, Bilal ; Vargas, Antonio Cesar
Author_Institution :
Grad. Sch. & Univ. Center, City Univ. of New York, New York, NY, USA
Abstract :
The study of malware often involves some form of grouping or clustering in order to indicate malware samples that are closely related. There are many ways that this can be performed, depending on the type of data that is recorded to represent the malware and the eventual goal of the grouping. While the concept of a malware family has been explored in depth, we introduce the concept of the malware genus, a grouping of malware that consists of very closely related samples determined by the relationships between samples within the malware population. Determining the boundaries of the malware genus is dependent upon the way that the malware samples are compared and the overall relationship between samples, with special attention paid to the parent-child relationship. Biologists have several criteria that are used to judge the usefulness of a genus when creating a taxonomy of organisms; we sought to design a classification that would be as useful in the world of malware research as it is in biology. We present two case studies in which we analyze a set of malware, using the Jensen-Shannon Distance between system call traces to measure distance between samples. The case studies show the genera that we create adhere to all of the criteria used when creating taxa of biological organisms.
Keywords :
invasive software; Jensen-Shannon distance; biological organisms; malware family; malware genera identification; malware genus; malware population; malware research; malware samples; parent-child relationship; system call traces; Biology; Educational institutions; Electronic mail; Malware; Measurement; Software; Standards;
Conference_Titel :
Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on
Conference_Location :
Fajardo, PR
Print_ISBN :
978-1-4799-7328-6
DOI :
10.1109/MALWARE.2014.6999409