DocumentCode :
3301847
Title :
To Incorporate Sequential Dynamic Features in Malware Detection Engines
Author :
Eskandari, Mojtaba ; Khorshidpur, Zeinab ; Hashemi, Sattar
Author_Institution :
Dept. of Comput. Sci. & Eng., Shiraz Univ., Shiraz, Iran
fYear :
2012
fDate :
22-24 Aug. 2012
Firstpage :
46
Lastpage :
52
Abstract :
Currently, signature-based detection is a widely used method within commercial antivirus. Although this method is still used by the most commercial antivirus softwares and is capable of detecting specific malwares quickly, it fails to detect new malwares. Therefore, antivirus engines are not limited to static signature based detection, their intelligent detection subsystem can detect unknown malwares more accurate than before. It utilizes an analyzer to extract appropriate features from executable files. It, then, applies a data mining technique on these features to learn behavior of benign programs and malicious ones. Consequently, it is able to detect unknown malwares according to their behavior. Application Programming Interface (API) call sequences are commonly used features in intelligent malware detection systems. An API call sequence captures the activities of a program and, hence, it is an excellent candidate for mining of any malicious behavior. Different order of each API in sequence infers different behavior model. Therefore, ordering of called API´s is an important issue to analyze malwares´ behavior. In this paper we propose a novel feature extraction approach for modeling malwares´ behavior. The presented approach extracts called API´s sequence by dynamic analysis method which is executing programs and capturing their called API´s. This approach utilizes N-grams method to preserve call ordering sequence of API´s. The experimental results show promissing accuracy of the presented approach for analyzing malwares.
Keywords :
application program interfaces; data mining; digital signatures; invasive software; program diagnostics; API call sequences; antivirus software engines; application programming interface; benign programs; call ordering sequence preservation; data mining technique; executable files; feature extraction; intelligent malware detection systems; malicious programs; malware behavior modeling; malware detection engines; n-gram method; sequential dynamic features; static signature-based detection; Data mining; Engines; Feature extraction; Grippers; Malware; Operating systems; Vegetation; API call sequence; Dynamic analysis; Malware detection; N-grams;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics Conference (EISIC), 2012 European
Conference_Location :
Odense
Print_ISBN :
978-1-4673-2358-1
Type :
conf
DOI :
10.1109/EISIC.2012.57
Filename :
6298812
Link To Document :
بازگشت