Malware Classification Methods Using API Sequence Characteristics

作者: Kyoung-Soo Han , In-Kyoung Kim , Eul Gyu Im

DOI: 10.1007/978-94-007-2911-7_60

关键词: Private information retrievalComputer securityDenial-of-service attackComputer scienceMalware analysisLoginSequenceMalwareClassification methodsPassword

摘要: Malware is generated to gain profits by attackers, and it infects many users’ computers. As a result, attackers can acquire private information such as login IDs, passwords, e-mail addresses, cell-phone numbers banking account from infected machines. Moreover, machines be used for other cyber-attacks DDoS attacks, spam transmissions, so on. The number of new malware discovered every day increasing continuously because the automated tools allow generate or their variants easily. Therefore, rapid analysis method required in order mitigate infection rate secondary damage users. In this paper, we proposed variant classification using sequential characteristics API used, described experiment results with some samples.

参考文章(13)
Charles Petzold, Programming Microsoft Windows with C ,(2002)
Greg Hoglund, Jamie Butler, Rootkits: Subverting the Windows Kernel ,(2005)
Iulian Moraru, John Truelove, David G. Andersen, Jiyong Jang, David Brumley, Sang Kil Cha, SplitScreen: enabling efficient, distributed malware detection networked systems design and implementation. pp. 25- 25 ,(2010) , 10.5555/1855711.1855736
Silvio Cesare, Yang Xiang, A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost advanced information networking and applications. pp. 721- 728 ,(2010) , 10.1109/AINA.2010.121
Qi-Guang Miao, Yun-Wang, Ying-Cao, Xian-Guo Zhang, Zhong-Lin Liu, APICapture - A tool for monitoring the behavior of malware international conference on advanced computer theory and engineering. ,vol. 4, ,(2010) , 10.1109/ICACTE.2010.5579452
Jusuk Lee, Kyoochang Jeong, Heejo Lee, Detecting metamorphic malwares using code graphs Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10. pp. 1970- 1977 ,(2010) , 10.1145/1774088.1774505
Vinod P. Nair, Harshit Jain, Yashwant K. Golecha, Manoj Singh Gaur, Vijay Laxmi, MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API security of information and networks. pp. 263- 269 ,(2010) , 10.1145/1854099.1854152
Qinghua Zhang, Douglas S. Reeves, MetaAware: Identifying Metamorphic Malware annual computer security applications conference. pp. 411- 420 ,(2007) , 10.1109/ACSAC.2007.9
Carsten Willems, Thorsten Holz, Felix Freiling, Toward Automated Dynamic Malware Analysis Using CWSandbox ieee symposium on security and privacy. ,vol. 5, pp. 32- 39 ,(2007) , 10.1109/MSP.2007.45
Abhishek Karnik, Suchandra Goswami, Ratan Guha, Detecting Obfuscated Viruses Using Cosine Similarity Analysis asia international conference on modelling and simulation. pp. 165- 170 ,(2007) , 10.1109/AMS.2007.31